

Detection of Mobile Replica Node Attacks in Wireless Sensor Networks using Sequential Hypothesis Testing
Abstract
Keywords
References
Capkun, S. &Hubaux, J.P. (2006). Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2):221-232, February 2006
Chan, H., Perrig, A., & Song, D. (2006). Secure hierarchical in-network aggregation in sensor networks . In ACM CCS, pages:278-287, October 2006.
Conti, M., Pietro, R., Mancini, L., & Mei, A. (2008). Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks. In ACM WiSec, April 2008
H. Choi, S. Zhu, and T.F La Porta. SET: Detecting node clones in Sensor Networks. In IEEE/CreateNet Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), 2007.
S. ˇCapkun and J.P. Hubaux. Secure Positioning in Wireless Networks.
IEEE Journal on Selected Areas in Communications, 24(2):221–232, February 2006
Parno B, Perrig A, Gligor VD. Distributed detection of node replication attacks in sensor networks.Proceedings of IEEE S&P; Oakland, CA, USA. 8–11 May 2005; pp. 49–63.
Ho JW, Wright M, Das SK. Fast detection of replica node attacks in mobile sensor networksusing sequential analysis. Proceedings of IEEE INFOCOM; Rio de Janeiro, Brazil. 19–25 April 2009; pp. 1773–1781.
Parno, B., Luk, M., Gaustad, E., and Perrig, A. (2006). Secure sensor network routing: a cleanslate approach. In ACM CoNEXT, December 2006.
Du, X. & Xiao, Y. (2008). Chapter 17: A survey on sensor network security Springer Wireless Sensor Networks and Applications, 2008 .
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.