刊名:EURASIP Journal on Wireless Communications and Networking
出版年:2014
出版时间:December 2014
年:2014
卷:2014
期:1
全文大小:804 KB
参考文献:1. Khan, W, Aalsalem, M (2013) Detection and mitigation of node replication attacks in wireless sensor networks: a survey. Int. J. Distribute Sens. Netw 2013: pp. 1-22 2. Zhang, DQ, Zhu, RB, Men, SQ, Raychoudhury, V (2013) Query representation with global consistency on user click graph. J. Internet Technol 14: pp. 759-769 3. Parno, B, Perrig, A, Gligpr, V (2005) Distributed detection of node replication attacks sensor networks. Proceedings of IEEE Symposium on Security and Privacy (S & P). pp. 49-63 4. Choi, H, Zhu, S, LA, TF (2007) SET Porta, Detecting node clones in sensor networks. Proceedings of the Third International Conference on Security and Privacy in Communication Networks. pp. 341-350 5. Yu, CM, Lu, CS, Kuo, SY (2012) CSI: compressed sensing-based clone identification in sensor networks. Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops. pp. 290-295 6. Conti, M, Pietro, RD, Mancini, LV, Mei, A (2006) Requirements and open issues in distributed detection of node identity replicas in WSN. Proceedings of the 2006 IEEE International Conference on Systems (Man and Cybernetics SMC 2006). pp. 1473 7. Xing, K, Cheng, X, Liu, F, Du, DH (2008) Real-time detection of clone attacks in wireless sensor networks. Paper presented at the 28th international conference on distributed computing systems. 8. Znaidi, W, Minier, M, Ubeda, S (2009) Hierarchical node replication attacks detection in wireless sensors networks. Proceedings of the 20th IEEE international symposium on personal, indoor and mobile radio communications. PIMRC鈥?9, Tokyo Japan, pp. 82-86 9. Zhang, M, Khanapure, V, Chen, S, Xiao, X (2009) Memory efficient protocols for detecting node replication attacks in wireless sensor networks. Proceedings of the 17th IEEE International Conference on Network Protocols ICNP 2009. pp. 284-293 CrossRef 10. Zeng, K, Govindan, K, Mohapatra, P (2010) Non-cryptographic authentication and identification in wireless networks. IEEE Wirel. Commun 17: pp. 56-62 CrossRef 11. Conti, M, Di Pietro, R, Mancini, LV, Mei, A (2007) A randomized, efficient, distributed protocol for the detection of node replication attacks in wireless sensor network. Proceedings of the 8th ACM International Symposium on Mobile (Ad Hoc Networking and Computing MobiHoc 2007). pp. 80-89 CrossRef 12. Zhu, B, Addada, VGK, Setia, S, Jajodia, S, Roy, S (2007) Efficient distributed detection of node replication attacks in sensor networks. Proceedings of the 23rd Annual Computer Security Applications Conference ACSAC 2007. pp. 257-266 13. Shu, WN, Cheng, L (2012) A novel load balancing optimization algorithm based on peer-to-peer technology in streaming media. J. Convergence Inform. Technol 7: pp. 189-196 CrossRef 14. Brooks, R, Govindaraju, PY, Pirretti, M, Vijaykrishnan, N, Kandemir, MT (2007) On the detection of clones in sensor networks using random key predistribution. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev 37: pp. 1246-1258 CrossRef 15. Zhu, B, Setia, S, Jajodia, S, Roy, S, Wang, L (2010) Localized multicast: efficient and distributed replica detection in large-scale sensor networks. IEEE Trans. Mob. Comput 9: pp. 913-926 CrossRef 16. Ho, JW, Wright, M, Das, SK (2011) Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing. IEEE Trans. Mob. Comput 10: pp. 767-782 CrossRef 17. Ho, JW, Wright, M, Das, SK (2009) Fast detection of replica node attacks in mobile sensor networks using sequential analysis. Proceedings of the IEEE INFOCOM. pp. 1773-1781 18. Deng, XM, Xiong, Y (2011) A new protocol for the detection of node replication attacks in mobile wireless sensor networks. J. Comput. Sci. Technol 26: pp. 732-743 CrossRef 19. Yu, CM, Lu, CS, Kuo, SY (2008) Mobile sensor network resilient against node replication attacks. Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor (Mesh and Ad Hoc Communications and Networks SECON 2008. pp. 597-599 CrossRef 20. Wang, YJ, Yang, TY, Ma, YG, Halade, GV, Zhang, JQ, Lindsey, ML, Jin, YF (2012) Mathematical modeling and stability analysis of macrophage activation in left ventricular remodeling post-myocardial infarction. BMC Genomics 13: pp. 1-8 CrossRef 21. Wang, LM, Shi, Y (2011) Patrol detection for replica attacks on wireless sensor networks. Sensors 11: pp. 2496-2504 CrossRef 22. Lou, Y, Zhang, Y, Liu, S (2012) Single hop detection of node clone attacks in mobile wireless sensor networks. Proceedings of the International Workshop on Information and Electronics Engineering (IWIEE). pp. 2798-2803 23. Zhu, WT, Zhou, J, Deng, R, Bao, F (2012) Detecting node replication attacks in mobile sensor networks: theory and approaches. Secur. Commun. Netw 5: pp. 496-507 CrossRef 24. Zhu, RB, Qin, YY, Lai, CF (2011) Adaptive packet scheduling scheme to support real-time traffic in WLAN mesh networks. KSII Transac. Internet Inform. Syst 5: pp. 1492-1512 25. Hess, F (2002) Efficient identity based signature schemes based on pairings. Proceedings of the Ninth Annual International Workshop on Selected Areas in Cryptography, SAC 2002. pp. 310-324 26. Chan, H, Perrig, A, Song, D (2003) Random key predistribution schemes for sensor networks. Proceedings of IEEE Symposium on Security and Privacy. pp. 197-213 27. Heinzelman, WR, Chandrakasan, A (2000) Energy-efficient communication protocol for wireless microsensor networks. Paper presented at the 33rd Hawaii international conference on system sciences. 28. Wang, YJ, Chen, P, Jin, YF (2009) Trajectory planning for an unmanned ground vehicle group using augmented particle swarm optimization in a dynamic environment. Proceedings of IEEE International Conference on Systems (Man and Cybernetics). pp. 4341-4346
刊物主题:Signal, Image and Speech Processing;
出版者:Springer International Publishing
ISSN:1687-1499
文摘
It is easy for adversaries to mount node replication attacks due to the unattended nature of wireless sensor networks. In several replica node detection schemes, witness nodes fail to work before replicas are detected due to the lack of effective random verification. This paper presents a novel distributed detection protocol to counteract node replication attacks. Our scheme distributes node location information to multiple randomly selected cells and then linear-multicasts the information for verification from the localized cells. Simulation results show that the proposed protocol improves detection efficiency compared with various existing protocols and prolongs the lifetime of the overall network.