Results 1 - 10
of
1,460
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks
, 2003
"... this paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a new key pre-distribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resili ..."
Abstract
-
Cited by 552 (18 self)
- Add to MetaCart
this paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a new key pre-distribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network
Distributed detection of node replication attacks in sensor networks
- PROCEEDINGS OF THE IEEE SYMPOSIUM ON SECURITY AND PRIVACY
, 2005
"... The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks ma ..."
Abstract
-
Cited by 206 (3 self)
- Add to MetaCart
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks
The Sybil attack in sensor networks: Analysis & Defenses
- THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, IPSN, 26 – 27 APRIL 2004 PAGE(S): 259 – 268
, 2004
"... Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper system-atically analyzes the threat posed by the Sybil attack to wireless ..."
Abstract
-
Cited by 392 (1 self)
- Add to MetaCart
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper system-atically analyzes the threat posed by the Sybil attack to wireless
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
"... Abstract—Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a large number of replicas, which are introduced into the network to perform insider attacks. Memory overhead, e ..."
Abstract
-
Cited by 11 (0 self)
- Add to MetaCart
Abstract—Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a large number of replicas, which are introduced into the network to perform insider attacks. Memory overhead
Efficient distributed detection of node replication attacks in sensor networks
- in Proc
"... Wireless sensor nodes lack hardware support for tamper-resistance and are often deployed in unattended environ-ments, thus leaving them vulnerable to capture and com-promise by an adversary. In a node replication attack, an adversary uses the credentials of a compromised node to surreptitiously intr ..."
Abstract
-
Cited by 22 (0 self)
- Add to MetaCart
introduce replicas of that node into the net-work. These replicas are then used to launch a variety of attacks that subvert the goal of the sensor application, and the operation of the underlying protocols. We present a novel distributed approach called Localized Multicast for detecting node replication
An Approach in Detection of Replication Node in Wireless Sensor Networks: A Survey
"... Abstract — This paper presents a complete study on the detection of replication node in wireless sensor networks. Consider a very severe and important physical attack on WSN which is called node replication attack or clone attack. It is also known as identity attack. Several algorithms are developed ..."
Abstract
- Add to MetaCart
Abstract — This paper presents a complete study on the detection of replication node in wireless sensor networks. Consider a very severe and important physical attack on WSN which is called node replication attack or clone attack. It is also known as identity attack. Several algorithms
A Survey of Dynamic Detection of Node Replication Attack in Wireless Sensor Network Dr.M.BalaGanesh
"... Abstract- A survey of MANET plays an major role in data communications. The node can be formed automatically without any centralised infrastructure, even though the nodes are formed automatically the replication of data to the node’s are unavoidable. In single point attack that brings the whole netw ..."
Abstract
- Add to MetaCart
Abstract- A survey of MANET plays an major role in data communications. The node can be formed automatically without any centralised infrastructure, even though the nodes are formed automatically the replication of data to the node’s are unavoidable. In single point attack that brings the whole
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
- MOBIHOC'07
, 2007
"... Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node rep ..."
Abstract
-
Cited by 46 (6 self)
- Add to MetaCart
Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node
An Asynchronous Node Replication Attack in Wireless Sensor Networks
"... Abstract Applications of wireless sensor network (WSN) are growing significantly, and many security protocols meant for WSN have been proposed. One of the unique problems of WSN is that the sensor nodes are not tamper resistant as the main attraction of deploying WSN is its low cost. Node replicati ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
to defend WSN against the replication attack, and one of the promising among them is distributed detection protocol presented by Parno et al. at IEEE S&P 2005. However, we show in this paper that their distributed detection protocol is vulnerable to an asynchronous node replication attack. Further, we
Clone Attack Detection Protocols in Wireless Sensor Networks: A Survey
"... Wireless Sensor Network (WSN) is a collection of autonomous sensor nodes which are low cost hardware components consists of sensor nodes with constraints on battery life, memory size and computation capabilities to monitor physical (or) environmental conditions. WSN is deployed in unattended and uns ..."
Abstract
- Add to MetaCart
. Then these clones can be deployed in all network areas, they can be considered as legitimate members of the network, so it is difficult to detect a replicated node. WSN can be either static (or) mobile, in that centralized and distributed clone attack detection methods are available. In this paper we analysis
Results 1 - 10
of
1,460