Imposter Detection for Replication Attacks in Mobile Sensor Networks

被引:0
|
作者
Dimitriou, Tassos [1 ,2 ]
Alrashed, Ebrahim A. [2 ]
Karaata, Mehmet Hakan [2 ]
Hamdan, Ali [2 ]
机构
[1] Comp Technol Inst, Patras, Greece
[2] Kuwait Univ, Dept Comp Engn, Safat 13060, Kuwait
来源
2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS) | 2015年
关键词
Mobile sensor networks; Imposter detection; Node replication attack; Node revocation; Soundness & Completeness; Sensor network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a node replication attack, an adversary creates replicas of captured sensor nodes in an attempt to control information that is reaching the base station or, more generally, compromise the functionality of the network. In this work, we develop fully distributed and completely decentralized schemes to detect and evict multiple imposters in mobile wireless sensor networks (MWSNs). The proposed schemes not only quarantine these malicious nodes but also withstand collusion against collaborating imposters trying to blacklist legitimate nodes of the network. Hence the completeness and soundness of the protocols are guaranteed. Our protocols are coupled with extensive mathematical and experimental results, proving the viability of our proposals, thus making them fit for realistic mobile sensor network deployments.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Coordination and selfishness in attacks on visual sensor networks
    Czarlinska, Alexandra
    Kundur, Deepa
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2391 - 2396
  • [22] Detection of Sybil Nodes in Mobile Sensor Networks Using the Context of Nodes Mobility
    Almas-Shehni, Rezvan
    Faez, Karim
    COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS, CNDS 2013, 2014, 428 : 117 - 128
  • [23] Study of Proactive Routing Protocol in Wildfire Detection Using Mobile Sensor Networks
    Sakran, Ammar AbdRaba
    Khekan, Ahlam R.
    Rashid, Ali Fadhil
    Ahmed, Suhaib S.
    Abbas, Jehan Ali
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2022, 25 (03): : 371 - 379
  • [24] Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Shaukat, Muhammad Arslan
    Alezabi, Kamal Ali
    SENSORS, 2020, 20 (08)
  • [25] Barycentric Coordinate-Based Distributed Localization for Mobile Sensor Networks Under Denial-of-Service Attacks
    Shi, Lei
    Shi, Huaguang
    Ma, Zhuangzhuang
    Yan, Shuaiming
    Zhou, Yi
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (05) : 8019 - 8030
  • [26] No Regret Learning for Sensor Relocation in Mobile Sensor Networks
    Li, Jin
    Zhang, Chi
    Liu, Wei Yi
    Yue, Kun
    INFORMATION COMPUTING AND APPLICATIONS, 2011, 7030 : 216 - +
  • [27] Communication Techniques for Mobile Sensor Networks
    Kanzaki, Akimitsu
    Nishio, Shojiro
    2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 221 - 226
  • [28] Traffic analysis of mobile sensor networks
    Martyna, Jerzy
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2007, : 33 - 38
  • [29] Evasion paths in mobile sensor networks
    Adams, Henry
    Carlsson, Gunnar
    INTERNATIONAL JOURNAL OF ROBOTICS RESEARCH, 2015, 34 (01): : 90 - 104
  • [30] Effects of communication on mobile sensor networks
    Cabrera-Mora, Flavio
    Xiao, Jizhong
    Sun, Yi
    2006 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS, VOLS 1-12, 2006, : 1452 - +