Location Similarity based Replica Node Detection for Sensor Networks

被引:0
作者
Yang, Lijun [1 ]
Ding, Chao [2 ]
Wu, Meng [3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Internet Things, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Coll Comp Sci, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Key Lab Broadband Wireless Commun & Sensor Networ, Minist Educ, Nanjing, Jiangsu, Peoples R China
来源
PROCEEDINGS OF 2016 9TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2 | 2016年
基金
中国国家自然科学基金;
关键词
sensor networks; security; replica detection; location anomaly detection; deployment knowledge;
D O I
10.1109/ISCID.2016.127
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The node replica attack is known to be dangerous to wireless sensor networks (WSNs) because it enables the adversary to extend the damage throughout the network with very low cost. To stop such attack, we propose a similarity estimation based scheme with group deployment knowledge. Compared with prior works, our proposal provides extra functionality that prevent replica from generating false location claims. Through simulation experiment, we evaluate the performance of the proposed scheme and demonstrate that our scheme achieves effectiveness and efficiency under different situations and attack strategies.
引用
收藏
页码:56 / 59
页数:4
相关论文
共 9 条
[1]  
[Anonymous], P 7 ANN INT C MOB CO
[2]  
Charikar M., 2010, P STC, P380
[3]  
Conti M, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P80
[4]   LAD: Localization anomaly detection for wireless sensor networks [J].
Du, Wenliang ;
Fang, Lei ;
Peng, Ning .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (07) :874-886
[5]  
Eschenauer L., P 9 ACM C COMP COMM, P41
[6]   Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks [J].
Ho, Jun-Won ;
Liu, Donggang ;
Wright, Matthew ;
Das, Sajal K. .
AD HOC NETWORKS, 2009, 7 (08) :1476-1488
[7]  
Karlof Chris., 2004, SENSYS 04
[8]   Distributed detection of node replication attacks in sensor networks [J].
Parno, B ;
Perrig, A ;
Gligor, V .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :49-63
[9]  
Parno Bryan., 2006, ACM CoNEXT