• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 248,887
Next 10 →

Distributed detection of node replication attacks in sensor networks

by Bryan Parno, Adrian Perrig, Virgil Gligor - PROCEEDINGS OF THE IEEE SYMPOSIUM ON SECURITY AND PRIVACY , 2005
"... The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks ma ..."
Abstract - Cited by 199 (3 self) - Add to MetaCart
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks

Efficient distributed detection of node replication attacks in sensor networks

by Bo Zhu, Venkata Gopala, Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy - in Proc
"... Wireless sensor nodes lack hardware support for tamper-resistance and are often deployed in unattended environ-ments, thus leaving them vulnerable to capture and com-promise by an adversary. In a node replication attack, an adversary uses the credentials of a compromised node to surreptitiously intr ..."
Abstract - Cited by 17 (0 self) - Add to MetaCart
introduce replicas of that node into the net-work. These replicas are then used to launch a variety of attacks that subvert the goal of the sensor application, and the operation of the underlying protocols. We present a novel distributed approach called Localized Multicast for detecting node replication

A Critique of the Paper “Distributed Detection of Node Replication Attacks in Sensor Networks ” [1]

by Cse Spring, Christopher Clader
"... This paper that we are critiquing describes a type of attack, and then presents a number of existing and new solutions to that attack. The attack that the paper presents is that attackers can easily replicate sensor nodes and then insert duplicates of them into a sensor network. These duplicates can ..."
Abstract - Add to MetaCart
This paper that we are critiquing describes a type of attack, and then presents a number of existing and new solutions to that attack. The attack that the paper presents is that attackers can easily replicate sensor nodes and then insert duplicates of them into a sensor network. These duplicates

Active detection of node replication attacks

by Carlos Aguilar Melchor, Boussad Ait-salem, Karim Tamine - International Journal of Computer Science and Network Security (IJCSNS), 9:13–21 , 2009
"... Sensor networks allow to deploy large self-organized and adaptable sets of sensors for many applications such as monitoring, detection, tracking etc. Unfortunately, the simplicity and low-cost of the sensors eases replication of nodes by attackers. Node replication attacks are the entry point to a l ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
large span of insidious attacks. Using replicas it is possible to capture, alter or suppress traffic and to disrupt protocols through misbehavior. In 2005 Parno et al. proposed a passive protocol [1] for distributed detection of node replication attacks in sensor networks based on location claims

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

by Chris Karlof, David Wagner - , 2003
"... We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as agq1( We propose securitygcur forrouting in sensor networks, show how attacks agacks ad-hoc and peer-to-peer networks can be ..."
Abstract - Cited by 789 (3 self) - Add to MetaCart
We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as agq1( We propose securitygcur forrouting in sensor networks, show how attacks agacks ad-hoc and peer-to-peer networks can

A Key-Management Scheme for Distributed Sensor Networks

by Laurent Eschenauer, Virgil D. Gligor - In Proceedings of the 9th ACM Conference on Computer and Communications Security , 2002
"... Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and communication capabilities. DSNs are dynamic in the sense that they allow addition and deletion of sensor nodes after deployment to grow the network or replace failing and unreliable ..."
Abstract - Cited by 901 (11 self) - Add to MetaCart
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and communication capabilities. DSNs are dynamic in the sense that they allow addition and deletion of sensor nodes after deployment to grow the network or replace failing and unreliable

Random key predistribution schemes for sensor networks

by Haowen Chan, Adrian Perrig, Dawn Song - IN PROCEEDINGS OF THE 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY , 2003
"... Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes could be physically compromised by an adversary. We present three new mechanisms for key establishment using the ..."
Abstract - Cited by 813 (14 self) - Add to MetaCart
the framework of pre-distributing a random set of keys to each node. First, in the q-composite keys scheme, we trade off the unlikeliness of a large-scale network attack in order to significantly strengthen random key predistribution’s strength against smaller-scale attacks. Second, in the multipath

Wireless sensor networks: a survey

by I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci , 2002
"... This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential sensor networks applications are explored, and a review of fact ..."
Abstract - Cited by 1936 (23 self) - Add to MetaCart
This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential sensor networks applications are explored, and a review

Denial of Service in Sensor Networks

by Anthony D. Wood, John A. Stankovic, Anthony D, John A - Upper Saddle River , 2002
"... Unless their developers take security into account at design time, sensor networks and the protocols they depend on will remain vulnerable to denial of service attacks. We identify denial of service weaknesses and solutions for sensor network devices and analyze two network protocols. ..."
Abstract - Cited by 462 (13 self) - Add to MetaCart
Unless their developers take security into account at design time, sensor networks and the protocols they depend on will remain vulnerable to denial of service attacks. We identify denial of service weaknesses and solutions for sensor network devices and analyze two network protocols.

Maté: A Tiny Virtual Machine for Sensor Networks

by Philip Levis, David Culler , 2002
"... Composed of tens of thousands of tiny devices with very limited resources ("motes"), sensor networks are subject to novel systems problems and constraints. The large number of motes in a sensor network means that there will often be some failing nodes; networks must be easy to repopu-late. ..."
Abstract - Cited by 502 (21 self) - Add to MetaCart
Composed of tens of thousands of tiny devices with very limited resources ("motes"), sensor networks are subject to novel systems problems and constraints. The large number of motes in a sensor network means that there will often be some failing nodes; networks must be easy to repopu
Next 10 →
Results 1 - 10 of 248,887
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University