Loading [MathJax]/extensions/MathMenu.js
Imposter detection for replication attacks in mobile sensor networks | IEEE Conference Publication | IEEE Xplore

Imposter detection for replication attacks in mobile sensor networks


Abstract:

In a node replication attack, an adversary creates replicas of captured sensor nodes in an attempt to control information that is reaching the base station or, more gener...Show More

Abstract:

In a node replication attack, an adversary creates replicas of captured sensor nodes in an attempt to control information that is reaching the base station or, more generally, compromise the functionality of the network. In this work, we develop fully distributed and completely decentralized schemes to detect and evict multiple imposters in mobile wireless sensor networks (MWSNs). The proposed schemes not only quarantine these malicious nodes but also withstand collusion against collaborating imposters trying to blacklist legitimate nodes of the network. Hence the completeness and soundness of the protocols are guaranteed. Our protocols are coupled with extensive mathematical and experimental results, proving the viability of our proposals, thus making them fit for realistic mobile sensor network deployments.
Date of Conference: 27-29 July 2015
Date Added to IEEE Xplore: 24 September 2015
ISBN Information:

ISSN Information:

Conference Location: Paris, France

References

References is not available for this document.