A Bloom Filter and Matrix-based Protocol for Detecting Node Replication Attack
نویسندگان
چکیده
A crucial problem in the security of wireless sensor network is that the nodes are subject to several kinds of attacks and threat like node replication attack, and it may bring serious consequence. To mitigate the damage brought by the node replication attack, in this paper, we propose a replication detection protocol that can discriminate the replicated nodes through detecting geographic fingerprints collision output from the bloom filter. If the receiver node found a conflicting location claim, that indicated there was an aggressor, then the node replication attack was detected. Moreover the usage of matrix decomposition ensured the security of the network, and also it provided the communication link verification.
منابع مشابه
Multi-User Broadcast Authentication Protocol in Wireless Sensor Networks against DoS Attack
In order to achieve the multi-user broadcast authentication in WSNs (Wireless Sensor Networks) defending against DoS (Denial-of-Service) attack, a multi-user broadcast authentication protocol in WSNs was proposed based on the improved ECDSA (Elliptic Curve Digital Signature Algorithm) with partial message recovery. The authenticity of the user public key is verified by using bloom filter, which...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملA Note-Based Randomized and Distributed Protocol for Detecting Node Replication Attacks in Wireless Sensor Networks
Wireless sensor networks are often deployed in hostile environments and sensor nodes are lack hardware support for resistance; thus, leaving them vulnerable to several kinds of threats and attacks. While most of threats and attacks can be prevented by using cryptographic approaches provided by key management, such as eavesdropping, intrusion and node compromising. Unfortunately node replication...
متن کاملOn Data Aggregation with Secure Bloom Filter in Wireless Sensor Networks
Designing secure data aggregation schemes, which are critical to many sensor network applications, imposes interesting and formidable challenges. In this paper, we propose a succinct and practical secure aggregation protocol by combining HMAC (associated with a cryptographic hash function) with Bloom filter, which then is defined as secure Bloom filter. Unlike most previous approaches, which ar...
متن کاملUtilizing bloom filters for detecting flooding attacks against SIP based services
Any application or service utilizing the Internet is exposed to both general Internet attacks and other specific ones. Most of the times the latter are exploiting a vulnerability or misconfiguration in the provided service and/or in the utilized protocol itself. Consequently, the employment of critical services, like Voice over IP (VoIP) services, over the Internet is vulnerable to such attacks...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JNW
دوره 9 شماره
صفحات -
تاریخ انتشار 2014