Asian Journal of Information Technology

Year: 2014
Volume: 13
Issue: 7
Page No. 389 - 394

X-RED: A Dynamic Detection of Clone Attacks in Static Wireless Sensor Networks

Authors : C. Geetha and M. Ramakrishnan

References

Adleman, L.M., R.L. Rivest and A. Shamir, 1977. Cryptographic communications system and method. U.S. Patent No. 4405829 A. http://www.google.com/patents/US4405829.

Akyildiz, I.F., W. Su, Y. Sankarasubramaniam and E. Cayirci, 2002. Wireless sensor networks: A survey. Comput. Networks, 38: 393-422.
CrossRef  |  Direct Link  |  

Bettstetter, C., 2002. On the minimum node degree and connectivity of a wireless multihop network. Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, June 9-11, 2002, Lausanne, Switzerland, pp: 80-91.

Brooks, R.R., P.Y. Govindaraju, M. Pirretti, N. Vijaykrishnan and M.T. Kandemir, 2007. On the detection of clones in sensor networks using random key predistribution. IEEE Trans. Syst. Man Cybernet. C: Appl. Rev., 37: 1246-1258.
CrossRef  |  

Chan, H., A. Perrig and D. Song, 2003. Random key predistribution schemes for sensor networks. Proceedings of the IEEE Symposium on Security and Privacy, May 11-14, 2003, Berkeley, CA., USA., pp: 197-213.

Cho, K., M. Jo, T. Kwon, H.H. Chen and D.H. Lee, 2013. Classification and experimental analysis for clone detection approaches in wireless sensor networks. IEEE Syst. J., 7: 26-35.
CrossRef  |  

Choi, H., S. Zhu and T.F. La Porta, 2007. SET: Detecting node clones in sensor networks. Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, September 17-21, 2007, Nice, France, pp: 341-350.

Conti, M., R. Di Pietro, L.V. Mancini and A. Mei, 2006. Requirements and open issues in distributed detection of node identity replicas in WSN. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, October 8-11, 2006, Taipei, Taiwan, pp: 1468-1473.

Conti, M., R. Di Pietro, L.V. Mancini and A. Mei, 2007. Efficient and distributed protocol for the detection of node replication attacks in wireless sensor networks. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing, September 9-14, 2007, Montreal, Quebec, Canada, pp: 80-89.

Conti, M., R. Di Pietro, L.V. Mancini and A. Mei, 2011. Distributed detection of clone attacks in wireless sensor networks. IEEE Trans. Dependable Secure Comput., 8: 685-698.
CrossRef  |  

Eschenauer, L. and V. D. Gligor, 2002. A key-management scheme for distributed sensor networks. Proceedings of the ACM Conference on Computer and Communications Security, November 18-22, 2002, Washington, DC., USA., pp: 41-47.

Ho, J.W., D. Liu, M. Wright and S.K. Das, 2009. Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks, 7: 1476-1488.
CrossRef  |  

Jian, H., X. Yan, M.X. Li and F.Y. Miao, 2012. A range-based detection method of replication attacks in wireless sensor networks. Proceedings of the International Conference on Information and Computer Networks, Volume 27, February 26-28, 2012, Singapore -.

Lupu, T.G., 2009. Main Types of Attacks in Wireless Sensor Networks. In: Recent Advances in Computer Engineering, Rudas, I. and N. Mastorakis (Eds.). WSEAS Press, USA., pp: 180-185.

Parno, B., A. Perrig and V. Gligor, 2005. Distributed detection of node replication attacks in sensor networks. Proceedings of the IEEE Symposium on Security and Privacy, May 8-11, 2005, Oakland, CA., USA., pp: 49-63.

Pietro, R.D., L.V. Mancini, A. Mei, A. Panconesi and J. Radhakrishnan, 2004. Connectivity properties of secure wireless sensor networks. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, October 25-29, 2004, Washington, DC., USA., pp: 53-58.

Xing, K., F. Liu, X. Cheng and D.H.C. Du, 2008. Real-time detection of clone attacks in wireless sensor networks. Proceedings of the 28th International Conference on a Distributed Computing System, June 17-20, 2008, Beijing, China, pp: 3-10.

Yu, C.M., C.S. Lu and S.Y. Kuo, 2009. Efficient and distributed detection of node replication attacks in mobile sensor networks. Proceedings of the IEEE 70th Vehicular Technology Conference Fall, September 20-23, 2009, Anchorage, AK., pp: 1-5.

Zhu, B., V.G.K. Addada, S. Setia, S. Jajodia and S. Roy, 2007. Efficient distributed detection of node replication attacks in sensor networks. Proceedings of the 23rd Annual Computer Security Applications Conference, December 10-14, 2007, Miami Beach, FL., USA., pp: 257-267.

Zhu, W.T., J. Zhou, R.H. Deng and F. Bao, 2012. Detecting node replication attacks in wireless sensor networks: A survey. J. Network Comput. Appl., 35: 1022-1034.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved