Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Denial of Service in Sensor Networks
Computer
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Local Leader Election, Signal Strength Aware Flooding, and Routeless Routing
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Localization and routing in sensor networks by local angle information
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
StarDust: a flexible architecture for passive localization in wireless sensor networks
Proceedings of the 4th international conference on Embedded networked sensor systems
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Space-Efficient Identity Based EncryptionWithout Pairings
FOCS '07 Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science
Group-based key predistribution for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Secure multi-hop network programming with multiple one-way key chains
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Self-monitoring for sensor networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
IEEE Transactions on Wireless Communications
SCAN: self-organized network-layer security in mobile ad hoc networks
IEEE Journal on Selected Areas in Communications
A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate it in a large number of clones and deploy them on the network. This node replication attack can form the basis of a variety of attacks such as DoS attacks, and Sybil attacks. Previous studies of node replication attacks have had some drawbacks; they need a central trusted entity or they become vulnerable when many nodes are compromised. Therefore, we propose a distributed protocol for detecting node replication attacks that is resilient to many compromised nodes. Our method does not need any reliable entities and has a high detection rate of replicated nodes. Our analysis and simulations demonstrate our protocol is effective even when there are a large number of compromised nodes.