Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 21
Page No. 4255 - 4268

Prevention Protocol for Node Replication Attack

Authors : V. Manjula, C. Cheallappn and R. Thalapathi Rajasekaran

References

Alarifi, A. and W. Du, 2006. Diversify sensor nodes to improve resilience against node compromise. Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, October 30, 2006, Alexandria, USA., pp: 101-112.

Anderson, R. and M. Kuhn, 1996. Tamper resistance-a cautionary note. Proceedings of the 2nd Usenix Workshop on Electronic Commerce, November 18-20, 1996, USENIX, Oakland, California, pp: 1-11.

Baig, Z.A., 2008. Distributed denial of service attack detection in wireless sensor networks. Ph.D Thesis, Monash University, Melbourne, Victoria,

Becher, A., Z. Benenson and M. Dornseif, 2006. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Security in Pervasive Computing, John, A.C., R.F. Paige, F.A.C. Polack and P.J. Brooke (Eds.). Springer, Berlin, Germany, ISBN:978-3-540-33376-0, pp: 104-118.

Bekara, C. and M. Laurent-Maknavicius, 2007. A new protocol for securing wireless sensor networks against nodes replication attacks. Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, October 8-10, 2007, White Plains, NY., pp: 59-59.

Conti, M., D.R. Pietro and A. Spognardi, 2014. Clone wars: Distributed detection of clone attacks in mobile WSNs. J. Comput. Syst. Sci., 80: 654-669.
Direct Link  |  

Conti, M., R.D. Pietro, L.V. Mancini and A. Mei, 2008. Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks. Proceedings of the 1st ACM Conference on Wireless Network Security, March 31-April 2, 2008, Alexandria, VA., USA., pp: 214-219.

Deng, X.M., Y. Xiong and D.P. Chen, 2010. Mobility-assisted detection of the replication attacks in mobile wireless sensor networks. Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, October 11-13, 2010, Niagara Falls, Canada, pp: 225-232.

Hartung, C., J. Balasalle and R. Han, 2004. Node compromise in sensor networks: The need for secure systems. Technical Report CU-CS-988-04, Department of Computer Science, University of Colorado at Boulder.

Ho, J.W., 2012. Sequential hypothesis testing based approach for replica cluster detection in wireless sensor networks. J. Sensor Actuator Networks, 1: 153-165.
CrossRef  |  Direct Link  |  

Jabbar, A., 2010. A framework to quantify network resilience and survivability. Ph.D Thesis, University of Kansas, Lawrence, Kansas. https://kuscholarworks.ku.edu/handle/1808/6770

Jokhio, S.H., I.A. Jokhio and A.H. Kemp, 2012. Node capture attack detection and defence in wireless sensor networks. IET. Wirel. Sensor Syst., 2: 161-169.
CrossRef  |  Direct Link  |  

Khan, W.Z., M.Y. Aalsalem, M.N.B.M. Saad and Y. Xiang, 2013. Detection and mitigation of node replication attacks in wireless sensor networks: A survey. Int. J. Distributed Sensor Networks, Vol. 2013. 10.1155/2013/149023

Kohno, E., T. Ohta and Y. Kakuda, 2009. Secure decentralized data transfer against node capture attacks for wireless sensor networks. Proceedings of the 2009 International Symposium on Autonomous Decentralized Systems, March 23-25, 2009, IEEE, New York, USA., ISBN:978-1-4244-4327-7, pp: 1-6.

Kohno, E., Y. Kakuda and A.I.D.A. Masaki, 2011. Improvement of dependability against node capture attacks for wireless sensor networks. IEICE. Trans. Inf. Syst., 94: 19-26.
Direct Link  |  

Liu, F., J.M. Rivera and X. Cheng, 2006. Location-aware key establishment in wireless sensor networks. Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, July 3-6, 2006, ACM, Vancouver, British, ISBN:1-59593-306-9, pp: 21-26.

Maala, B., Y. Challal, H. Bettahar and A. Bouabdallah, 2009. Node capture attack impact on key management schemes for heterogeneous wireless sensor networks. Proceedings of the 2009 Global Symposium on Information Infrastructure, June 23-26, 2009, IEEE, Compiegne, France, ISBN:978-1-4244-4623-0, pp: 1-7.

Mohammadi, S. and H. Jadidoleslamy, 2011. A comparison of link layer attacks on wireless sensor networks. Int. J. Appl. Graph Theory Wirel. Ad Hoc Networks Sensor Networks Graph. HOC., 3: 35-65.
CrossRef  |  

Shen, A.N. and S. Guo, 2009. A robust pair-wise rekeying protocol in hierarchical wireless sensor networks. Proceedings of the 5th International Student Workshop on Emerging Networking Experiments and Technologies, December 1-1, 2009, ACM, Rome, Italy, ISBN:978-1-60558-751-6, pp: 25-26.

Song, H., L. Xie, S. Zhu and G. Cao, 2007. Sensor node compromise detection: The location perspective. Proceedings of the International Conference on Wireless Communications and Mobile Computing, August 12-16, 2007, Honolulu, HI., USA., pp: 242-247.

Tague, P. and R. Poovendran, 2008. Modeling node capture attacks in wireless sensor networks. Proceedings of the 2008 46th Annual Allerton Conference on Communication, Control and Computing, September 23-26, 2008, IEEE, Washington, USA., ISBN:978-1-4244-2925-7, pp: 1221-1224.

Tran, D.T., 2010. Controlled link establishment attacks on distributed sensor networks and countermeasures. Ph.D Thesis, Kyung Hee University, Seoul, South Korea.

Wang, J., Z. Liu, S. Zhang and X. Zhang, 2014. Defending collaborative false data injection attacks in wireless sensor networks. Inform. Sci. Int. J., 254: 39-53.
CrossRef  |  Direct Link  |  

Yang, G.Z. and M. Yacoub, 2006. Body Sensor Networks. Springer, Berlin, Germany, ISBN:978-1-4471-6373-2,.

Yu, C.M., C.C. Li, C.S. Lu, D.T. Lee and S.Y. Kuo, 2007. Attack probability based deterministic key predistribution mechanism for non-uniform sensor deployment. Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07), June 22-29, 2007, IEEE, Taipei, Taiwan, ISBN:0-7695-2838-4, pp: 18-18.

Zhang, Y., W. Liu, W. Lou and Y. Fang, 2006. Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE. J. Selected Areas Commun., 24: 247-260.
CrossRef  |  Direct Link  |  

Zhu, S., S. Setia and S. Jajodia, 2006. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. ACM. Trans. Sensor Networks TOSN., 2: 500-528.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved