Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks
نویسندگان
چکیده
منابع مشابه
Node Clone Detection in Wireless Sensor Networks
Wireless sensor networks are harmed to the node clone, and different distributed protocols have been proposed to detect this attack. However, they require too strong assumptions to be practical for randomly deployed sensor networks. Here, we propose two new node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a DHT concept whic...
متن کاملDHT-Based Detection of Node Clone in Wireless Sensor Networks
Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left unattended. Several distributed protocols have been proposed for detecting clone. However, some protocols rely on an implicit assumption that every node is aware of all other nodes’ existence; other protocols using an geograph...
متن کاملDistributed Detection of Node Capture Attacks in Wireless Sensor Networks
Wireless sensor networks are vulnerable to node capture attacks because sensor nodes are usually deployed in unattended manner. Once attacker captures sensor nodes, he can compromise them and launch various types of attacks with those compromised nodes. Therefore, node capture attacks are hazardous and should be detected as soon as possible to reduce the harm incurred by them. To meet this need...
متن کاملDetection of Node Replication Attacks in Mobile Sensor Networks
The advanced sensor network architectures could be used for a variety of applications including intruder detection, border monitoring, and military patrols. In potentially hostile environments, the security of unattended mobile nodes is extremely critical. Due to the unattended nature of wireless sensor networks, an adversary can capture and compromise sensor nodes, make replicas of them, and t...
متن کاملDistributed detection of mobile malicious node attacks in wireless sensor networks
In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to multiple locations in the network, such as by employing simple robotic platforms or moving the nodes by hand, he can evade schemes that attempt to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Engineering
سال: 2012
ISSN: 1877-7058
DOI: 10.1016/j.proeng.2012.01.393