Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network

نویسندگان

  • Bryan Parno
  • Adrian Perrig
  • M. Conti
  • R. D. Pietro
  • L. V. Mancini
  • Shinichi Honiden
  • Chia-Mu Yu
  • Chun-Shien Lu
  • Xiaoming Deng
  • Yan Xiong
چکیده

The wireless sensor network is used to solve problems in real world such as industrial and environmental Sensing. There are two types of Wireless Sensor Network, Mobile and Static. They are the Wireless Sensor Network are prone to attacks. The most prominent attack in Wireless Sensor Network is node replication attack were the nodes are replicated virtually. The replicated node captures the key or id of the node, makes copies of the node in the network with the same id and may cripple the entire network. It is even more difficult to detect them if they are in a mobile network. The scheme proposed is for a mobile Wireless Sensor Network where the location makes the detection of replication attack even more challenging. The proposed scheme will not only trace the location using array of the locations in the mobile sensor network,

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network

The wireless sensor network is used to solve problems in real world such as industrial and environmental Sensing. There are two types of Wireless Sensor Network, Mobile and Static. They are the Wireless Sensor Network are prone to attacks. The most prominent attack in Wireless Sensor Network is node replication attack were the nodes are replicated virtually. The replicated node captures the key...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

ENERGY AWARE DISTRIBUTED PARTITIONING DETECTION AND CONNECTIVITY RESTORATION ALGORITHM IN WIRELESS SENSOR NETWORKS

 Mobile sensor networks rely heavily on inter-sensor connectivity for collection of data. Nodes in these networks monitor different regions of an area of interest and collectively present a global overview of some monitored activities or phenomena. A failure of a sensor leads to loss of connectivity and may cause partitioning of the network into disjoint segments. A number of approaches have be...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks

Positioning service is one of Wireless Sensor Networks’ (WSNs) fundamental services. The accurate position of the sensor nodes plays a vital role in many applications of WSNs. In this paper, a 3D positioning algorithm is being proposed, using mobile anchor node to assist sensor nodes in order to estimate their positions in a 3D geospatial environment. However, mobile anchor node’s 3D path optim...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015