Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks

  title={Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks},
  author={Yuichi Sei and Shinichi Honiden},
ABSTRACT In large-scalesensornetworks, sensor nodesareat high risk of being capturedand compromised.Oncea sensornodeis compromised,all thesecretkeys, data,and codestoredon it areexposed to theattacker. Theattacker caninsertarbitrarymaliciouscode in the compromised node.Moreover, he can easily replicateit in a largenumberof clonesanddeploy them onthenetwork. Thisnode replicationattackcanform thebasisof a varietyof attackssuchas DoS attacks,andSybil attacks.Previous studiesof nodereplication… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications referenced by this paper.
Showing 1-10 of 30 references

Distributed detectionof node replicationattacksin sensornetworks.In

  • BryanParno, AdrianPerrig, Virgil Gligor
  • IEEE S&P, pages 49–63,
  • 2005
Highly Influential
17 Excerpts

Efficientdistributed detectionof node replicationattacksin sensornetworks.In IEEE ACSAC, pages257–267,2007

  • Bo Zhu, VenkataGopalaKrishnaAddada, Sanjeev Setia, SushilJajodia, andSankardasRoy
  • Digital Object Identifier:
  • 2008
Highly Influential
6 Excerpts

GPSR: Greedy perimeter statelessroutingfor wirelessnetworks.In ACM MOBICOM, pages243–254,2000

  • BradKarpandH.T. Kung
  • 2000
Highly Influential
3 Excerpts

Group - based key predistribution for wirelesssensornetworks

  • Liqian Luo, TarekF.
  • ACM Trans . Sen . Netw .
  • 2008

Group-based key predistribution for wirelesssensornetworks.ACM

  • DonggangLiu, PengNing, andWenliangDu
  • Trans. Sen. Netw.,
  • 2008

Mitigatingdosattacks againstbroadcast authenticationin wirelesssensornetworks

  • PengNing, An Liu, andWenliangDu
  • ACM Trans. Sen. Netw.,
  • 2008
1 Excerpt

Secureand fault - tolerant eventboundarydetectionin wirelesssensor networks

  • Adi Shamir
  • IEEE Transactions on Wireless Communications
  • 2008

Secureand fault-tolerant eventboundarydetectionin wirelesssensor

  • Kui Ren, Kai Zeng, andWenjingLou
  • networks.IEEE Transactions on Wireless…
  • 2008

Securemulti - hop network programmingwith multipleoneway key chains

  • AnthonyD.
  • ACM WiSec , pages
  • 2008

Similar Papers

Loading similar papers…