DocumentCode
1728114
Title
Deterministic detection of node replication attacks in sensor networks
Author
Yu-Shen Ho ; Ruay-Lien Ma ; Cheng-En Sung ; I-Chen Tsai ; Li-Wei Kang ; Chia-Mu Yu
Author_Institution
Yuan Ze Univ., Chungli, Taiwan
fYear
2015
Firstpage
468
Lastpage
469
Abstract
In Wireless Sensor Networks (WSNs), because sensor nodes do not equip with tamper resistance hardwares, they are vulnerable to the capture and compromise performed by the adversary. By launching the node replication attack, the adversary can place the replicas of captured sensor nodes back into the sensor networks so as to eavesdrop the transmitted messages or compromise the functionality of the network. Although several protocols are proposed to defend against node replication attacks, all the proposed methods can only detect the node replication attacks probabilistically. In this paper, we propose Quorum-Based Multicast (QBM) and Star-shape Line-Selected Multicast (SLSM) to detect the node replication attacks, both of which can deterministically detect the replicas.
Keywords
multicast communication; telecommunication security; wireless sensor networks; deterministic detection; node replication attacks; quorum-based multicast; star-shape line-selected multicast; wireless sensor networks; Cloning; Hardware; Mobile communication; Probabilistic logic; Protocols; Security; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Consumer Electronics - Taiwan (ICCE-TW), 2015 IEEE International Conference on
Conference_Location
Taipei
Type
conf
DOI
10.1109/ICCE-TW.2015.7217002
Filename
7217002
Link To Document