Deterministic detection of node replication attacks in sensor networks

Yu Shen Ho, Ruay Lien Ma, Cheng En Sung, I. Chen Tsai, Li Wei Kang, Chia Mu Yu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

In Wireless Sensor Networks (WSNs), because sensor nodes do not equip with tamper resistance hardwares, they are vulnerable to the capture and compromise performed by the adversary. By launching the node replication attack, the adversary can place the replicas of captured sensor nodes back into the sensor networks so as to eavesdrop the transmitted messages or compromise the functionality of the network. Although several protocols are proposed to defend against node replication attacks, all the proposed methods can only detect the node replication attacks probabilistically. In this paper, we propose Quorum-Based Multicast (QBM) and Star-shape Line-Selected Multicast (SLSM) to detect the node replication attacks, both of which can deterministically detect the replicas.

Original languageEnglish
Title of host publication2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages468-469
Number of pages2
ISBN (Electronic)9781479987443
DOIs
Publication statusPublished - 2015 Aug 20
Externally publishedYes
Event2nd IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015 - Taipei, Taiwan
Duration: 2015 Jun 62015 Jun 8

Publication series

Name2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015

Other

Other2nd IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015
Country/TerritoryTaiwan
CityTaipei
Period2015/06/062015/06/08

Keywords

  • Cloning
  • Hardware
  • Mobile communication
  • Probabilistic logic
  • Protocols
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Instrumentation
  • Media Technology

Fingerprint

Dive into the research topics of 'Deterministic detection of node replication attacks in sensor networks'. Together they form a unique fingerprint.

Cite this