@inproceedings{c5e538451856450ba6038e392db5b600,
title = "Deterministic detection of node replication attacks in sensor networks",
abstract = "In Wireless Sensor Networks (WSNs), because sensor nodes do not equip with tamper resistance hardwares, they are vulnerable to the capture and compromise performed by the adversary. By launching the node replication attack, the adversary can place the replicas of captured sensor nodes back into the sensor networks so as to eavesdrop the transmitted messages or compromise the functionality of the network. Although several protocols are proposed to defend against node replication attacks, all the proposed methods can only detect the node replication attacks probabilistically. In this paper, we propose Quorum-Based Multicast (QBM) and Star-shape Line-Selected Multicast (SLSM) to detect the node replication attacks, both of which can deterministically detect the replicas.",
keywords = "Cloning, Hardware, Mobile communication, Probabilistic logic, Protocols, Security, Wireless sensor networks",
author = "Ho, {Yu Shen} and Ma, {Ruay Lien} and Sung, {Cheng En} and Tsai, {I. Chen} and Kang, {Li Wei} and Yu, {Chia Mu}",
note = "Publisher Copyright: {\textcopyright} 2015 IEEE.; 2nd IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015 ; Conference date: 06-06-2015 Through 08-06-2015",
year = "2015",
month = aug,
day = "20",
doi = "10.1109/ICCE-TW.2015.7217002",
language = "English",
series = "2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "468--469",
booktitle = "2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015",
}