Detection and Avoidance of Node Replication Attacks in Mobile Wireless Sensor Networks
Abstract
Keywords
Full Text:
PDFReferences
Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu and Sy-Yen Kuo, “Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks ,” Information Forensics and Security , IEEE Trans., vol. 8, no. 5, pp. 754-768, 2013.
Martin Krebs, Andr´e Stein, M´onica Alejandra Lora, ” Topology Stability-based Clustering for Wireless Mesh Networks”, Global Telecommunications Conference, 2010
M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, “Distributed detection of clone attacks in wireless sensor networks,” IEEE Trans. Depend.Secure Comput., vol. 8, no. 5, pp. 685–698, Sep./Oct. 2012.
M. Conti, R. D. Pietro, and A. Spognardi, “Wireless sensor replica detection in mobile environment,” in Proc. Int. Conf. Distributed Computing and Networking (ICDCN), Hong Kong, China, 2012.
B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang,(2010) “Localized multicast: Efficient and distributed replica detection in large-scale sensor networks,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 913–926.
M. Zhang, V. Khanapure, S. Chen, and X. Xiao,(2009) “Memory efficient protocols for detecting node replication attacks in wireless sensor networks,” in Proc. IEEE Int. Conf. Network Protocols (ICNP), Princeton, NJ, USA, pp. 284–293.
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo,(2008) “Mobile sensor network resilient against node replication attacks,” in Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), California, USA, pp. 597–599.
J. Yi, J. Koo, and H. Cha,(2008) “A localization technique for mobile sensor networks using archived anchor information,” in Proc. IEEE Conf. Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), California, USA, pp. 64–72.
K. Xing and X. Cheng,(2010) “From time domain to space domain: Detecting replica attacks in mobile ad hoc networks,” in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), SanDiego,CA, USA, pp. 1–9.
B. Parno, A. Perrig, and V. Gligor,(2005) “Distributed detection of node replication attacks in sensor networks,” in Proc. IEEE Symp. Security and Privacy (S&P), Oakland, CA, USA, pp. 49–63.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.