Wireless Networks
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
DEXA '07 Proceedings of the 18th International Conference on Database and Expert Systems Applications
An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02
Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
A number of green technologies such as Smart Power Grids, Smart Buildings, Smart Industrial Process and Smart Transportation rely on sensor technology. Sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most efficient manner. However, a significant challenge in the practical application of sensor networks is the need for credible network security. An important problem in wireless network security is sender authentication. The existing schemes for sender authentication that are based on IP and MAC address can be easily spoofed by the sender. In this paper, we propose a method to apply signal prints to WSNs so as to detect identity-based attacks. The use of signal prints allows us to identify the sender based on the received signal characteristics thereby making it harder to spoof. However, in a Wireless Sensor Network (WSN), battery discharge causes received signal characteristics to vary. Also, WSNs are dense networks and, generally, do not have a centralized authority. These must be taken into a consideration while designing a solution.