Results 1 - 10
of
248,887
Distributed detection of node replication attacks in sensor networks
- PROCEEDINGS OF THE IEEE SYMPOSIUM ON SECURITY AND PRIVACY
, 2005
"... The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks ma ..."
Abstract
-
Cited by 199 (3 self)
- Add to MetaCart
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks
Efficient distributed detection of node replication attacks in sensor networks
- in Proc
"... Wireless sensor nodes lack hardware support for tamper-resistance and are often deployed in unattended environ-ments, thus leaving them vulnerable to capture and com-promise by an adversary. In a node replication attack, an adversary uses the credentials of a compromised node to surreptitiously intr ..."
Abstract
-
Cited by 17 (0 self)
- Add to MetaCart
introduce replicas of that node into the net-work. These replicas are then used to launch a variety of attacks that subvert the goal of the sensor application, and the operation of the underlying protocols. We present a novel distributed approach called Localized Multicast for detecting node replication
A Critique of the Paper “Distributed Detection of Node Replication Attacks in Sensor Networks ” [1]
"... This paper that we are critiquing describes a type of attack, and then presents a number of existing and new solutions to that attack. The attack that the paper presents is that attackers can easily replicate sensor nodes and then insert duplicates of them into a sensor network. These duplicates can ..."
Abstract
- Add to MetaCart
This paper that we are critiquing describes a type of attack, and then presents a number of existing and new solutions to that attack. The attack that the paper presents is that attackers can easily replicate sensor nodes and then insert duplicates of them into a sensor network. These duplicates
Active detection of node replication attacks
- International Journal of Computer Science and Network Security (IJCSNS), 9:13–21
, 2009
"... Sensor networks allow to deploy large self-organized and adaptable sets of sensors for many applications such as monitoring, detection, tracking etc. Unfortunately, the simplicity and low-cost of the sensors eases replication of nodes by attackers. Node replication attacks are the entry point to a l ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
large span of insidious attacks. Using replicas it is possible to capture, alter or suppress traffic and to disrupt protocols through misbehavior. In 2005 Parno et al. proposed a passive protocol [1] for distributed detection of node replication attacks in sensor networks based on location claims
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
-
, 2003
"... We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as agq1( We propose securitygcur forrouting in sensor networks, show how attacks agacks ad-hoc and peer-to-peer networks can be ..."
Abstract
-
Cited by 789 (3 self)
- Add to MetaCart
We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as agq1( We propose securitygcur forrouting in sensor networks, show how attacks agacks ad-hoc and peer-to-peer networks can
A Key-Management Scheme for Distributed Sensor Networks
- In Proceedings of the 9th ACM Conference on Computer and Communications Security
, 2002
"... Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and communication capabilities. DSNs are dynamic in the sense that they allow addition and deletion of sensor nodes after deployment to grow the network or replace failing and unreliable ..."
Abstract
-
Cited by 901 (11 self)
- Add to MetaCart
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and communication capabilities. DSNs are dynamic in the sense that they allow addition and deletion of sensor nodes after deployment to grow the network or replace failing and unreliable
Random key predistribution schemes for sensor networks
- IN PROCEEDINGS OF THE 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY
, 2003
"... Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes could be physically compromised by an adversary. We present three new mechanisms for key establishment using the ..."
Abstract
-
Cited by 813 (14 self)
- Add to MetaCart
the framework of pre-distributing a random set of keys to each node. First, in the q-composite keys scheme, we trade off the unlikeliness of a large-scale network attack in order to significantly strengthen random key predistribution’s strength against smaller-scale attacks. Second, in the multipath
Wireless sensor networks: a survey
, 2002
"... This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential sensor networks applications are explored, and a review of fact ..."
Abstract
-
Cited by 1936 (23 self)
- Add to MetaCart
This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential sensor networks applications are explored, and a review
Denial of Service in Sensor Networks
- Upper Saddle River
, 2002
"... Unless their developers take security into account at design time, sensor networks and the protocols they depend on will remain vulnerable to denial of service attacks. We identify denial of service weaknesses and solutions for sensor network devices and analyze two network protocols. ..."
Abstract
-
Cited by 462 (13 self)
- Add to MetaCart
Unless their developers take security into account at design time, sensor networks and the protocols they depend on will remain vulnerable to denial of service attacks. We identify denial of service weaknesses and solutions for sensor network devices and analyze two network protocols.
Maté: A Tiny Virtual Machine for Sensor Networks
, 2002
"... Composed of tens of thousands of tiny devices with very limited resources ("motes"), sensor networks are subject to novel systems problems and constraints. The large number of motes in a sensor network means that there will often be some failing nodes; networks must be easy to repopu-late. ..."
Abstract
-
Cited by 502 (21 self)
- Add to MetaCart
Composed of tens of thousands of tiny devices with very limited resources ("motes"), sensor networks are subject to novel systems problems and constraints. The large number of motes in a sensor network means that there will often be some failing nodes; networks must be easy to repopu
Results 1 - 10
of
248,887