Imposter Detection for Replication Attacks in Mobile Sensor Networks

被引:0
|
作者
Dimitriou, Tassos [1 ,2 ]
Alrashed, Ebrahim A. [2 ]
Karaata, Mehmet Hakan [2 ]
Hamdan, Ali [2 ]
机构
[1] Comp Technol Inst, Patras, Greece
[2] Kuwait Univ, Dept Comp Engn, Safat 13060, Kuwait
来源
2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS) | 2015年
关键词
Mobile sensor networks; Imposter detection; Node replication attack; Node revocation; Soundness & Completeness; Sensor network security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a node replication attack, an adversary creates replicas of captured sensor nodes in an attempt to control information that is reaching the base station or, more generally, compromise the functionality of the network. In this work, we develop fully distributed and completely decentralized schemes to detect and evict multiple imposters in mobile wireless sensor networks (MWSNs). The proposed schemes not only quarantine these malicious nodes but also withstand collusion against collaborating imposters trying to blacklist legitimate nodes of the network. Hence the completeness and soundness of the protocols are guaranteed. Our protocols are coupled with extensive mathematical and experimental results, proving the viability of our proposals, thus making them fit for realistic mobile sensor network deployments.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Residual energy-based replica detection scheme for mobile wireless sensor networks
    Mishra, Alekha Kumar
    Turuk, Ashok Kumar
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 637 - 648
  • [32] Intrusion Detection Based on k-Coverage in Mobile Sensor Networks With Empowered Intruders
    Huang, Haiping
    Gong, Tianhe
    Zhang, Rong
    Yang, Lie-Liang
    Zhang, Jiancong
    Xiao, Fu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (12) : 12109 - 12123
  • [33] Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi V.
    Mei, Alessandro
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 214 - 219
  • [34] Solving Sensor Void Problem in Uncontrolled Mobile Sensor Networks Development of Mobile Sensor Database Systems
    Park, Soo Scok
    Lim, Chong Sok
    Hyun, Soon J.
    SENSORNETS: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, 2015, : 47 - 55
  • [35] Mobile Anchor-Assisted Localization for Mobile Sensor Networks
    Ou, Chia-Ho
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (01): : 37 - 48
  • [36] The Replication Attack in Wireless Sensor Networks: Analysis and Defenses
    Manjula, V.
    Chellappan, C.
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 169 - 178
  • [37] An asynchronous node replication attack in wireless sensor networks
    Zhou, Jianying
    Das, Tanmoy Kanti
    Lopez, Javier
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 125 - +
  • [38] Adaptive Trap Coverage in Mobile Sensor Networks
    Kuo, Chia-Hsu
    Chen, Tzung-Shi
    Syu, Siou-Ci
    14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 : 102 - 109
  • [39] Coverage Control for Mobile Sensor Networks on a Circle
    Song, Cheng
    Feng, Gang
    UNMANNED SYSTEMS, 2014, 2 (03) : 243 - 248
  • [40] A review of control and localization for mobile sensor networks
    Yuan, Liang
    Chen, Weidong
    Xi, Yugeng
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 183 - 183