Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator
ACM Transactions on Modeling and Computer Simulation (TOMACS) - Special issue on uniform random number generation
Reaching Agreement in the Presence of Faults
Journal of the ACM (JACM)
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Time Synchronization for Wireless Sensor Networks
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks
IEEE Transactions on Dependable and Secure Computing
SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Mobility and cooperation to thwart node capture attacks in MANETs
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
From time domain to space domain: detecting replica attacks in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Distributed Detection of Clone Attacks in Wireless Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
On the Detection of Clones in Sensor Networks Using Random Key Predistribution
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Clone wars: Distributed detection of clone attacks in mobile WSNs
Journal of Computer and System Sciences
Hi-index | 0.00 |
Wireless Sensor Networks (WSNs) pose a few unique security challenges due to the fact that they (often) run unattended, do not rely on tamper-resistant hardware, and are severely resource constrained--to name a few. In this context, a particularly dreadful attack is the replica attack. That is, sensors are captured and their state seized, and replicated in reprogrammed sensors eventually performing some rogue activities. While some solutions to this problem do exist in static WSNs, mobile WSNs lack of solutions that are both effective and efficient, due to the complexity added by sensor mobility. In this paper, we propose a novel solution against the replica attack in mobile WSNs. In particular, we provide the following contributions: we first introduce a novel realistic attacker model that can be used to assess the quality of the solutions provided. Later, we detail a distributed, efficient, and cooperative protocol to detect replica. Leveraging just local (one-hop) communications and node mobility our solution enforces the emergent property of replica detection. Finally, our solution is tested against the introduced attacker model. Simulation results show that our solution is effective and efficient--providing high detection rate while incurring limited overhead.