Deterministic detection of node replication attacks in sensor networks

Yu Shen Ho, Ruay Lien Ma, Cheng En Sung, I. Chen Tsai, Li Wei Kang, Chia Mu Yu

研究成果: 書貢獻/報告類型會議論文篇章

3 引文 斯高帕斯(Scopus)

摘要

In Wireless Sensor Networks (WSNs), because sensor nodes do not equip with tamper resistance hardwares, they are vulnerable to the capture and compromise performed by the adversary. By launching the node replication attack, the adversary can place the replicas of captured sensor nodes back into the sensor networks so as to eavesdrop the transmitted messages or compromise the functionality of the network. Although several protocols are proposed to defend against node replication attacks, all the proposed methods can only detect the node replication attacks probabilistically. In this paper, we propose Quorum-Based Multicast (QBM) and Star-shape Line-Selected Multicast (SLSM) to detect the node replication attacks, both of which can deterministically detect the replicas.

原文英語
主出版物標題2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015
發行者Institute of Electrical and Electronics Engineers Inc.
頁面468-469
頁數2
ISBN(電子)9781479987443
DOIs
出版狀態已發佈 - 2015 8月 20
對外發佈
事件2nd IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015 - Taipei, 臺灣
持續時間: 2015 6月 62015 6月 8

出版系列

名字2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015

其他

其他2nd IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015
國家/地區臺灣
城市Taipei
期間2015/06/062015/06/08

ASJC Scopus subject areas

  • 人工智慧
  • 電腦網路與通信
  • 電氣與電子工程
  • 儀器
  • 媒體技術

指紋

深入研究「Deterministic detection of node replication attacks in sensor networks」主題。共同形成了獨特的指紋。

引用此