Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise
CIS '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
IEEE Pervasive Computing
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
WIMOB '08 Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
ACM Transactions on Sensor Networks (TOSN)
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
IEEE Transactions on Dependable and Secure Computing
Increasing Resiliency in Multi-phase Wireless Sensor Networks
The Computer Journal
Jamming sensor networks: attack and defense strategies
IEEE Network: The Magazine of Global Internetworking
Mobile Networks and Applications
Hi-index | 0.00 |
In the node capture attack, the adversary intelligently captures nodes and extracts the cryptographic keys from their memories to destroy the security, reliability and confidentiality of the wireless sensor networks. However, it suffers from low attacking efficiency and high resource expenditure. In this paper, we approach this attack from an adversarial view and develop a matrix-based method to model the process of the node capture attack. We establish a matrix to indicate the compromising relationship between the nodes and the paths. We propose a Matrix-based node capture attack Algorithm (MA in short), which can maximize the destructiveness while consuming the minimum resource expenditure. We conduct several experiments to show the performance of MA. Experimental results manifest that MA can reduce the attacking round, shorten the execution time, enhance the attacking efficiency and conserve the energy cost.