Asian Journal of Information Technology

Year: 2013
Volume: 12
Issue: 9
Page No. 297 - 304

A Novel Distributed and Secured IRED Protocol for Detecting Node Replication Attack in Wireless Sensor Network

Authors : P. Uma Maheswari and P. Ganesh Kumar

References

Bonaci, T., P. Lee, L. Bushnell and R. Poovendran, 2011. Distributed clone detection in wireless sensor networks: An optimization approach. Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, June 20-24, 2011, Lucca, Italy, pp: 1-6.

Bonaci, T., P. Lee, L. Bushnell and R. Poovendran, 2013. A convex optimization approach for clone detection in wireless sensor networks. Pervasive Mobile Comput., 9: 528-545.
CrossRef  |  Direct Link  |  

Chan, H., A. Perrig and D. Song, 2003. Random key predistribution schemes for sensor networks. Proceedings of the IEEE Symposium on Security and Privacy, May 11-14, 2003, Berkeley, CA., USA., pp: 197-213.

Conti, M., R. Di Pietro and L.V. Mancini, 2006. Secure cooperative channel establishment in wireless sensor networks. Proceedings of the 4th Annual International Conference on Pervasive Computing and Communications, March 13-17, 2006, Pisa, Italy, pp: 327-331.

Conti, M., R. Di Pietro and L.V. Mancini, 2007. ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. Ad Hoc Networks, 5: 49-62.
CrossRef  |  Direct Link  |  

Conti, M., R. Di Pietro, A. Gabrielli, L.V. Mancini and A. Mei, 2009. The quest for mobility models to analyse security in mobile ad hoc networks. Proceedings of the 7th International Conference on Wired/Wireless Internet Communications, May 27-29, 2009, Enscheda, The Netherlands, pp: 85-96.

Conti, M., R. Di Pietro, L.V. Mancini and A. Mei, 2006. Requirements and open issues in distributed detection of node identity replicas in WSN. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, October 8-11, 2006, Taipei, Taiwan, pp: 1468-1473.

Conti, M., R. Di Pietro, L.V. Mancini and A. Mei, 2007. Efficient and distributed protocol for the detection of node replication attacks in wireless sensor networks. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing, September 9-14, 2007, Montreal, Quebec, Canada, pp: 80-89.

Conti, M., R. Di Pietro, L.V. Mancini and A. Mei, 2009. Mobility and cooperation to thwart node capture attacks in MANETs. J. Wireless Commun. Network., 10.1155/2009/945943

Conti, M., R.D. Pietro, L.V. Mancini and A. Mei, 2008. Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks. Proceedings of the 1st ACM Conference on Wireless Network Security, March 31-April 2, 2008, Alexandria, VA., USA., pp: 214-219.

Demirbas, M. and Y. Song, 2006. An RSSI-based scheme for sybil attack detection in wireless sensor networks. Proceedings of the International Symposium on World of Wireless, Mobile and Multimedia Networks, June 26-29, 2006, New York, pp: 564-570.

Di Pietro, R. and L.V. Mancini, 2008. Intrusion Detection Systems: Advances in Information Security. Springer, London, UK., ISBN-13: 9780387772653, Pages: 264.

Di Pietro, R., D. Ma, C. Soriente and G. Tsudik, 2008. POSH: Proactive co-operative self-healing in unattended wireless sensor networks. Proceedings of the IEEE Symposium on Reliable Distributed Systems, October 6-8, 2008, Naples, Italy, pp: 185-194.

Di Pietro, R., L.V. Mancini and A. Mei, 2006. Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks, 12: 709-721.
CrossRef  |  Direct Link  |  

Di Pietro, R., L.V. Mancini, A. Mei, A. Panconesi and J. Radhakrishnan, 2006. Sensor networks that are provably resilient. Proceedings on the International Conference on Security and Privacy in Communication Networks and the Workshops, Auguest 28-September 1, 2006, Baltimore, pp: 1-10.

Di Pietro, R., L.V. Mancini, C. Soriente, A. Spognardi and G. Tsudik, 2009. Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks, 7: 1463-1475.
CrossRef  |  Direct Link  |  

Douceur, J.R., 2002. The Sybil attack. Proceedings of the 1st International Workshop on Peer-to-Peer Systems, March 7-8, 2002, Cambridge, MA., USA., pp: 251-260.

Eschenauer, L. and V. D. Gligor, 2002. A key-management scheme for distributed sensor networks. Proceedings of the ACM Conference on Computer and Communications Security, November 18-22, 2002, Washington, DC., USA., pp: 41-47.

Gligor, V.D., 2006. Emergent properties in ad-hoc networks: A security perspective. Proceedings of the Symposium on Information, Computer and Communications Security, October 30-November 3, 2006, Alexandria, Virginia, p: 1-.

Ho, J.W., M. Wright and S. Das, 2009. Fast detection of replica node attacks in mobile sensor networks using sequential analysis. Proceedings of the 28th IEEE International Conference on Computer Communications, April 19-25 2009, Rio de Janeiro, Brazil, pp: 1773-1781.

Newsome, J., E. Shi, D. Song and A. Perrig, 2004. The sybil attack in sensor networks: Analysis and defenses. Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, April 26-27, 2004, Berkeley, CA, USA., pp: 259-268.

Parno, B., A. Perrig and V. Gligor, 2005. Distributed detection of node replication attacks in sensor networks. Proceedings of the IEEE Symposium on Security and Privacy, May 8-11, 2005, Oakland, CA., USA., pp: 49-63.

Song, H., L. Xie, S. Zhu and G. Cao, 2007. Sensor node compromise detection: The location perspective. Proceedings of the International Conference on Wireless Communications and Mobile Computing, August 12-16, 2007, Honolulu, HI., USA., pp: 242-247.

Zhang, Q., T. Yu and P. Ning, 2008. A framework for identifying compromised nodes in wireless sensor networks. ACM Trans. Inform. Syst. Secur., Vol. 11 10.1145/1341731.1341733

Zhu, B., V.G.K. Addada, S. Setia, S. Jajodia and S. Roy, 2007. Efficient distributed detection of node replication attacks in sensor networks. Proceedings of the 23rd Annual Computer Security Applications Conference, December 10-14, 2007, Miami Beach, FL., USA., pp: 257-267.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved