Imposter Detection for Replication Attacks in Mobile Sensor Networks

被引:0
|
作者
Dimitriou, Tassos [1 ,2 ]
Alrashed, Ebrahim A. [2 ]
Karaata, Mehmet Hakan [2 ]
Hamdan, Ali [2 ]
机构
[1] Comp Technol Inst, Patras, Greece
[2] Kuwait Univ, Dept Comp Engn, Safat 13060, Kuwait
来源
2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS) | 2015年
关键词
Mobile sensor networks; Imposter detection; Node replication attack; Node revocation; Soundness & Completeness; Sensor network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a node replication attack, an adversary creates replicas of captured sensor nodes in an attempt to control information that is reaching the base station or, more generally, compromise the functionality of the network. In this work, we develop fully distributed and completely decentralized schemes to detect and evict multiple imposters in mobile wireless sensor networks (MWSNs). The proposed schemes not only quarantine these malicious nodes but also withstand collusion against collaborating imposters trying to blacklist legitimate nodes of the network. Hence the completeness and soundness of the protocols are guaranteed. Our protocols are coupled with extensive mathematical and experimental results, proving the viability of our proposals, thus making them fit for realistic mobile sensor network deployments.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Imposter detection for replication attacks in mobile sensor networks
    Dimitriou, Tassos
    Alrashed, Ebrahim A.
    Karaata, Mehmet Hakan
    Hamdan, Ali
    COMPUTER NETWORKS, 2016, 108 : 210 - 222
  • [2] An Two Dimension detection to node replication attacks in mobile sensor networks
    Zhou, Chang
    Wang, Ze
    PROCEEDINGS OF 2016 10TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2016, : 63 - 69
  • [3] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    Journal of Computer Science & Technology, 2011, (04) : 732 - 743
  • [4] Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks
    Deng, Xiaoming
    Xiong, Yan
    Chen, Depin
    2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 225 - 232
  • [5] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Deng, Xiao-Ming
    Xiong, Yan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (04) : 732 - 743
  • [6] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    Xiao-Ming Deng
    Yan Xiong
    Journal of Computer Science and Technology, 2011, 26 : 732 - 743
  • [7] An adaptive stabilizing imposter detection scheme for distributed mobile wireless sensor networks
    Alrashed, Ebrahim A.
    Karaata, Mehmet H.
    Hamdan, Ali
    Albahar, Badour
    AD HOC NETWORKS, 2017, 65 : 1 - 12
  • [8] Detecting node replication attacks in mobile sensor networks: theory and approaches
    Zhu, Wen Tao
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 496 - 507
  • [9] Danger Theory based Node Replication Attacks Detection in Mobile Wireless Sensor Network
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Sali, A.
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [10] Dynamic Detection of Node Replication Attacks using X-RED in Wireless Sensor Networks
    Abinaya, P.
    Geetha, C.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,