A Dynamic ID Assignment Mechanism to Defend Against Node Replication Attack in Static Wireless Sensor Networks
DOI: http://dx.doi.org/10.30630/joiv.3.1.161
Abstract
Keywords
Full Text:
PDFReferences
Akyildiz, I.F. and Kasimoglu, I.H., 2004. Wireless sensor and actor☆ networks: research challenges. Ad hoc networks, 2(4), pp.351-367.
Jamshidi, M., Zangeneh, E., Esnaashari, M. and Meybodi, M.R., 2017. A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks. Computers & Electrical Engineering, 64, pp.220-232.
Jamshidi, M., Ranjbari, M., Esnaashari, M., Qader, N.N. and Meybodi, M.R., 2018. Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes. JOIV: International Journal on Informatics Visualization, 2(3), pp.159-165.
Dhakne, A.R. and Chatur, P.N., 2017. Detailed Survey on attacks in wireless sensor network. In Proceedings of the International Conference on Data Engineering and Communication Technology on (pp. 319-331). Springer, Singapore.
Padmavathi, D.G. and Shanmugapriya, M., 2009. A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.
Parno, B., Perrig, A. and Gligor, V., 2005, May. Distributed detection of node replication attacks in sensor networks. In Security and Privacy, 2005 IEEE Symposium on (pp. 49-63). IEEE.
Choi, H., Zhu, S. and La Porta, T.F., 2007, SET: Detecting node clones in sensor networks. In Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on (pp. 341-350). IEEE.
Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S. and Roy, S., 2007. Efficient distributed detection of node replication attacks in sensor networks. In acsac (pp. 257-267). IEEE.
Conti, M., Di Pietro, R., Mancini, L.V. and Mei, A., 2007. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (pp. 80-89). ACM.
Conti, M., Di Pietro, R., Mancini, L. and Mei, A., 2011. Distributed detection of clone attacks in wireless sensor networks. IEEE transactions on dependable and secure computing, 8(5), pp.685-698.
Kim, C., Park, C., Hur, J., Lee, H. and Yoon, H., 2009. A distributed deterministic and resilient replication attack detection protocol in wireless sensor networks. In Communication and Networking (pp. 405-412). Springer, Berlin, Heidelberg.
Zeng, Y., Cao, J., Zhang, S., Guo, S. and Xie, L., 2010. Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE Journal on selected areas in communications, 28(5).
Yu, C.M., Lu, C.S. and Kuo, S.Y., 2012. CSI: compressed sensing-based clone identification in sensor networks. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on (pp. 290-295). IEEE.
Zhang, M., Khanapure, V., Chen, S. and Xiao, X., 2009. Memory efficient protocols for detecting node replication attacks in wireless sensor networks. In Network Protocols, 2009. ICNP 2009. 17th IEEE International Conference on (pp. 284-293). IEEE.
Yu, C.M., Lu, C.S. and Kuo, S.Y., 2008. Mobile sensor network resilient against node replication attacks. In Sensor, Mesh and Ad Hoc Communications and Networks, 2008. SECON'08. 5th Annual IEEE Communications Society Conference on (pp. 597-599). IEEE.
Ho, J.W., Wright, M. and Das, S.K., 2009. Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In INFOCOM 2009, IEEE (pp. 1773-1781). IEEE.
Yu, C.M., Lu, C.S. and Kuo, S.Y., 2009, September. Efficient and distributed detection of node replication attacks in mobile sensor networks. In Vehicular Technology Conference Fall (VTC 2009-Fall), 2009 IEEE 70th (pp. 1-5). IEEE.
Gowtham, B. and Sharmila, S., 2012. Location Traced Hybrid Detection of Node Replication Attack in Mobile Wireless Sensor Network. Proc. of the Special Issue of International Journal of Computer Applications (0975–8887) on Information Processing and Remote Computing–IPRC.
Deng, X.M. and Xiong, Y., 2011. A new protocol for the detection of node replication attacks in mobile wireless sensor networks. Journal of Computer Science and Technology, 26(4), pp.732-743.
Lou, Y., Zhang, Y. and Liu, S., 2012. Single hop detection of node clone attacks in mobile wireless sensor networks. Procedia Engineering, 29, pp.2798-2803.
Ho, J.W., Wright, M. and Das, S.K., 2011. Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing. IEEE transactions on mobile computing, 10(6), pp.767-782.
Zhu, W.T., Zhou, J., Deng, R.H. and Bao, F., 2012. Detecting node replication attacks in mobile sensor networks: theory and approaches. Security and Communication Networks, 5(5), pp.496-507.
Conti, M., Di Pietro, R. and Spognardi, A., 2012. Wireless sensor replica detection in mobile environments. In International Conference on Distributed Computing and Networking (pp. 249-264). Springer, Berlin, Heidelberg.
Ratnasamy, S., Karp, B., Yin, L., Yu, F., Estrin, D., Govindan, R. and Shenker, S., 2002. GHT: a geographic hash table for data-centric storage. In Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications (pp. 78-87). ACM.
Bloom, B.H., 1970. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7), pp.422-426.
Bekara, C. and Laurent-Maknavicius, M., 2007. A new protocol for securing wireless sensor networks against nodes replication attacks. In Wireless and Mobile Computing, Networking and Communications, 2007. WiMOB 2007. Third IEEE International Conference on (pp. 59-59). IEEE.
Seah, W.K., Tan, H.P. and Lee, P.W., 2010. Multipath virtual sink architecture for underwater sensor networks. In Underwater Acoustic Sensor Networks (pp. 78-113). Auerbach Publications.
Jamshidi, M., Andalib, A. and Naseri, L., 2016. A Three-level Propagation Method of Routing Packets Specialized for Underwater Wireless Sensor Networks. International Journal of Computer Applications, 147(7).
J-SIM Simulator, https://sites.google.com/site/jsimofficial/, December 25, 2017.