• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,460
Next 10 →

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks

by Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili , 2003
"... this paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a new key pre-distribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resili ..."
Abstract - Cited by 552 (18 self) - Add to MetaCart
this paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a new key pre-distribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network

Distributed detection of node replication attacks in sensor networks

by Bryan Parno, Adrian Perrig, Virgil Gligor - PROCEEDINGS OF THE IEEE SYMPOSIUM ON SECURITY AND PRIVACY , 2005
"... The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks ma ..."
Abstract - Cited by 206 (3 self) - Add to MetaCart
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks

The Sybil attack in sensor networks: Analysis & Defenses

by James Newsome, Elaine Shi, Dawn Song, Adrian Perrig - THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, IPSN, 26 – 27 APRIL 2004 PAGE(S): 259 – 268 , 2004
"... Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper system-atically analyzes the threat posed by the Sybil attack to wireless ..."
Abstract - Cited by 392 (1 self) - Add to MetaCart
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper system-atically analyzes the threat posed by the Sybil attack to wireless

Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks

by Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelian Xiao
"... Abstract—Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a large number of replicas, which are introduced into the network to perform insider attacks. Memory overhead, e ..."
Abstract - Cited by 11 (0 self) - Add to MetaCart
Abstract—Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a large number of replicas, which are introduced into the network to perform insider attacks. Memory overhead

Efficient distributed detection of node replication attacks in sensor networks

by Bo Zhu, Venkata Gopala, Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy - in Proc
"... Wireless sensor nodes lack hardware support for tamper-resistance and are often deployed in unattended environ-ments, thus leaving them vulnerable to capture and com-promise by an adversary. In a node replication attack, an adversary uses the credentials of a compromised node to surreptitiously intr ..."
Abstract - Cited by 22 (0 self) - Add to MetaCart
introduce replicas of that node into the net-work. These replicas are then used to launch a variety of attacks that subvert the goal of the sensor application, and the operation of the underlying protocols. We present a novel distributed approach called Localized Multicast for detecting node replication

An Approach in Detection of Replication Node in Wireless Sensor Networks: A Survey

by Raju M, Selvan M
"... Abstract — This paper presents a complete study on the detection of replication node in wireless sensor networks. Consider a very severe and important physical attack on WSN which is called node replication attack or clone attack. It is also known as identity attack. Several algorithms are developed ..."
Abstract - Add to MetaCart
Abstract — This paper presents a complete study on the detection of replication node in wireless sensor networks. Consider a very severe and important physical attack on WSN which is called node replication attack or clone attack. It is also known as identity attack. Several algorithms

A Survey of Dynamic Detection of Node Replication Attack in Wireless Sensor Network Dr.M.BalaGanesh

by unknown authors
"... Abstract- A survey of MANET plays an major role in data communications. The node can be formed automatically without any centralised infrastructure, even though the nodes are formed automatically the replication of data to the node’s are unavoidable. In single point attack that brings the whole netw ..."
Abstract - Add to MetaCart
Abstract- A survey of MANET plays an major role in data communications. The node can be formed automatically without any centralised infrastructure, even though the nodes are formed automatically the replication of data to the node’s are unavoidable. In single point attack that brings the whole

A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks

by Mauro Conti, Roberto Di Pietri, Luigi V. Mancini, Alessandro Mei - MOBIHOC'07 , 2007
"... Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node rep ..."
Abstract - Cited by 46 (6 self) - Add to MetaCart
Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node

An Asynchronous Node Replication Attack in Wireless Sensor Networks

by Tanmoy Jianying Zhou , Kanti Das , Javier Lopez
"... Abstract Applications of wireless sensor network (WSN) are growing significantly, and many security protocols meant for WSN have been proposed. One of the unique problems of WSN is that the sensor nodes are not tamper resistant as the main attraction of deploying WSN is its low cost. Node replicati ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
to defend WSN against the replication attack, and one of the promising among them is distributed detection protocol presented by Parno et al. at IEEE S&P 2005. However, we show in this paper that their distributed detection protocol is vulnerable to an asynchronous node replication attack. Further, we

Clone Attack Detection Protocols in Wireless Sensor Networks: A Survey

by J. Anthoniraj
"... Wireless Sensor Network (WSN) is a collection of autonomous sensor nodes which are low cost hardware components consists of sensor nodes with constraints on battery life, memory size and computation capabilities to monitor physical (or) environmental conditions. WSN is deployed in unattended and uns ..."
Abstract - Add to MetaCart
. Then these clones can be deployed in all network areas, they can be considered as legitimate members of the network, so it is difficult to detect a replicated node. WSN can be either static (or) mobile, in that centralized and distributed clone attack detection methods are available. In this paper we analysis
Next 10 →
Results 1 - 10 of 1,460
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University