By Topic

Adversary Information Gathering Model for Node Capture Attack in Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Alekha Kumar Mishra ; Dept. of Comput. Sci. & Eng., Nat. Inst. of Technol. Rourkela, Rourkela, India ; Ashok Kumar Turuk

Node capture attack is considered to be one of the most serious attack in WSN. An adversary physically captures a node so that she can steal all the confidential information stored in it and can launch further attacks by deploying clones of a captured node. To achieve this she needs to gather useful information regarding the network before capturing a node. Hence, a node capture by an adversary depends on how quickly she is able to gather the information regarding the network and about the target node. In this paper we have proposed a model for the process of gathering information by an adversary. We have also found the expected amount of information an adversary have at an arbitrary time t. Using the above information we proposed the expected time of a node capture based on the strength of an adversary and the dynamicity of the network.

Published in:

Devices and Communications (ICDeCom), 2011 International Conference on

Date of Conference:

24-25 Feb. 2011