Imposter Detection for Replication Attacks in Mobile Sensor Networks

被引:0
|
作者
Dimitriou, Tassos [1 ,2 ]
Alrashed, Ebrahim A. [2 ]
Karaata, Mehmet Hakan [2 ]
Hamdan, Ali [2 ]
机构
[1] Comp Technol Inst, Patras, Greece
[2] Kuwait Univ, Dept Comp Engn, Safat 13060, Kuwait
关键词
Mobile sensor networks; Imposter detection; Node replication attack; Node revocation; Soundness & Completeness; Sensor network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a node replication attack, an adversary creates replicas of captured sensor nodes in an attempt to control information that is reaching the base station or, more generally, compromise the functionality of the network. In this work, we develop fully distributed and completely decentralized schemes to detect and evict multiple imposters in mobile wireless sensor networks (MWSNs). The proposed schemes not only quarantine these malicious nodes but also withstand collusion against collaborating imposters trying to blacklist legitimate nodes of the network. Hence the completeness and soundness of the protocols are guaranteed. Our protocols are coupled with extensive mathematical and experimental results, proving the viability of our proposals, thus making them fit for realistic mobile sensor network deployments.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Imposter detection for replication attacks in mobile sensor networks
    Dimitriou, Tassos
    Alrashed, Ebrahim A.
    Karaata, Mehmet Hakan
    Hamdan, Ali
    [J]. COMPUTER NETWORKS, 2016, 108 : 210 - 222
  • [2] Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
    Yu, Chia-Mu
    Tsou, Yao-Tung
    Lu, Chun-Shien
    Kuo, Sy-Yen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 754 - 768
  • [3] Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks
    Wang, Ze
    Zhou, Chang
    Liu, Yiran
    [J]. MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [4] Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks
    Yu, Chia-Mu
    Lu, Chun-Shien
    Kuo, Sy-Yen
    [J]. 2009 IEEE 70TH VEHICULAR TECHNOLOGY CONFERENCE FALL, VOLS 1-4, 2009, : 1085 - +
  • [5] An Two Dimension detection to node replication attacks in mobile sensor networks
    Zhou, Chang
    Wang, Ze
    [J]. PROCEEDINGS OF 2016 10TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2016, : 63 - 69
  • [6] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    [J]. Journal of Computer Science & Technology., 2011, 26 (04) - 743
  • [7] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    [J]. Journal of Computer Science & Technology, 2011, (04) : 732 - 743
  • [8] Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks
    Deng, Xiaoming
    Xiong, Yan
    Chen, Depin
    [J]. 2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 225 - 232
  • [9] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Deng, Xiao-Ming
    Xiong, Yan
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (04) : 732 - 743
  • [10] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Xiao-Ming Deng
    Yan Xiong
    [J]. Journal of Computer Science and Technology, 2011, 26 : 732 - 743