Cart (Loading....) | Create Account
Close category search window
 

Distributed detection of replicas with deployment knowledge in wireless sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Jun-Won Ho ; Dept. of Comput. Sci. & Eng., Univ. of Texas at Arlington, Arlington, TX ; Donggang Liu ; Wright, M. ; Das, S.K.

A number of protocols have been developed to mitigate the threat against wireless sensor networks of an attacker finding nodes, compromising them, and using these nodes to eavesdrop or undermine the operation of the network. A more dangerous threat that has received less attention, however, is that of replica nodes, in which the attacker compromises a node, extracts its keying materials, and produces a large number of replicas that he can spread throughout the network. This attack enables the attacker to leverage the compromise of a single node to create widespread effects on the network. To defend against these attacks, we propose distributed detection mechanisms to find and revoke replicas. Our schemes are based on the assumption that nodes are deployed in groups, which is realistic for many deployment scenarios. By taking advantage of group deployment knowledge, our schemes perform replica detection in a distributed, efficient, and secure manner. We show analytically and in simulation that our schemes achieve effective and robust replica detection capability with substantially lower communication, computational, and storage overheads than prior work.

Published in:

Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on

Date of Conference:

9-13 March 2009

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.