메뉴 건너뛰기




Volumn 8, Issue 5, 2013, Pages 754-768

Localized algorithms for detection of node replication attacks in mobile sensor networks

Author keywords

Attack; security; wireless sensor networks

Indexed keywords

ATTACK; EFFICIENCY AND EFFECTIVENESS; EXTENSIVE EXPLORATIONS; MOBILE SENSOR NETWORKS; NODE REPLICATION DETECTIONS; PERFORMANCE COMPARISON; PROTOTYPE IMPLEMENTATIONS; SECURITY;

EID: 84876143327     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2255285     Document Type: Article
Times cited : (40)

References (34)
  • 2
    • 3042778324 scopus 로고    scopus 로고
    • Stochastic properties of the random waypoint mobility model
    • C. Bettstetter, H. Hartenstein, and X. P. Costa, "Stochastic properties of the random waypoint mobility model," Wireless Netw., vol. 10, no. 5, pp. 555-567, 2004.
    • (2004) Wireless Netw , vol.10 , Issue.5 , pp. 555-567
    • Bettstetter, C.1    Hartenstein, H.2    Costa, X.P.3
  • 3
    • 14844367057 scopus 로고    scopus 로고
    • An improved data stream summary the count-min sketch and its applications
    • G. Cormode and S. Muthukrishnan, "An improved data stream summary the count-min sketch and its applications," J. Algorithms, vol. 55, no. 1, pp. 56-75, 2005.
    • (2005) J. Algorithms , vol.55 , Issue.1 , pp. 56-75
    • Cormode, G.1    Muthukrishnan, S.2
  • 4
    • 37849004592 scopus 로고    scopus 로고
    • Arandomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
    • Montreal, Canada
    • M. Conti, R.Di Pietro, L. V. Mancini, andA.Mei, "Arandomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks," in Proc. ACMInt. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), Montreal, Canada, 2007, pp. 80-89.
    • (2007) Proc. ACMInt. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc) , pp. 80-89
    • Conti, M.1    Di Pietro, R.2    Mancini, L.V.3    Mei, A.4
  • 5
    • 79960522083 scopus 로고    scopus 로고
    • Distributed detection of clone attacks in wireless sensor networks
    • Sep./Oct.
    • M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei, "Distributed detection of clone attacks in wireless sensor networks," IEEE Trans. Depend. Secure Comput., vol. 8, no. 5, pp. 685-698, Sep./Oct. 2012.
    • (2012) IEEE Trans. Depend. Secure Comput , vol.8 , Issue.5 , pp. 685-698
    • Conti, M.1    Pietro, R.D.2    Mancini, L.V.3    Mei, A.4
  • 8
    • 24144497473 scopus 로고    scopus 로고
    • The message delay in mobile ad hoc networks
    • DOI 10.1016/j.peva.2005.07.018, PII S0166531605000970, Performance 2005
    • R. Groenevelt, P. Nain, and G. Koole, "The message delay inmobile ad hoc networks," Performance Evaluation, vol. 62, no. 1, pp. 210-228, 2005. (Pubitemid 41240561)
    • (2005) Performance Evaluation , vol.62 , Issue.1-4 , pp. 210-228
    • Groenevelt, R.1    Nain, P.2    Koole, G.3
  • 10
    • 70349684548 scopus 로고    scopus 로고
    • Fast detection of replica node attacks in mobile sensor networks using sequential analysis
    • Brazil
    • J. Ho,M.Wright, and S. K. Das, "Fast detection of replica node attacks in mobile sensor networks using sequential analysis," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), Brazil, 2009, pp. 1773-1781.
    • (2009) Proc IEEE Int. Conf. Computer Communications (INFOCOM) , pp. 1773-1781
    • Ho, J.1    Wright, M.2    Das, S.K.3
  • 11
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks," Mobile Comput., pp. 153-181, 1996.
    • (1996) Mobile Comput , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 15
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • Missouri, USA
    • A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in Proc. Int. Conf. Information Processing in Sensor Networks (IPSN), Missouri, USA, 2008, pp. 245-256.
    • (2008) Proc. Int. Conf. Information Processing in Sensor Networks (IPSN) , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 16
    • 51849124994 scopus 로고    scopus 로고
    • Implementing public-key infrastructure for sensor networks
    • D. J. Malan, M. Welsh, and M. D. Smith, "Implementing public-key infrastructure for sensor networks," ACM Trans. Sensor Network, vol. 4, no. 4, pp. 1-23, 2008.
    • (2008) ACM Trans. Sensor Network , vol.4 , Issue.4 , pp. 1-23
    • Malan, D.J.1    Welsh, M.2    Smith, M.D.3
  • 18
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proc. IEEE Symp. Security and Privacy (S&P), Oakland, CA, USA, 2005, pp. 49-63. (Pubitemid 41543646)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 20
    • 4143077026 scopus 로고    scopus 로고
    • Scaling laws for capacity and delay in wireless ad hoc networks with random mobility
    • Paris, France
    • G. Sharma and R. Mazumdar, "Scaling laws for capacity and delay in wireless ad hoc networks with random mobility," in Proc. IEEE Int. Conf. Communications (ICC), Paris, France, 2004, pp. 3869-3873.
    • (2004) Proc. IEEE Int. Conf. Communications (ICC) , pp. 3869-3873
    • Sharma, G.1    Mazumdar, R.2
  • 21
    • 72449171946 scopus 로고    scopus 로고
    • Double rulings for information brokerage in sensor networks
    • Dec
    • R. Sarkar, X. Zhu, and J. Gao, "Double rulings for information brokerage in sensor networks," IEEE/ACM Trans. Netw., vol. 17, no. 6, pp. 1902-1915, Dec. 2009.
    • (2009) IEEE/ACM Trans. Netw , vol.17 , Issue.6 , pp. 1902-1915
    • Sarkar, R.1    Zhu, X.2    Gao, J.3
  • 22
    • 77953307472 scopus 로고    scopus 로고
    • From time domain to space domain: Detecting replica attacks in mobile ad hoc networks
    • SanDiego,CA, USA
    • K. Xing and X. Cheng, "From time domain to space domain: Detecting replica attacks in mobile ad hoc networks," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), SanDiego,CA, USA, 2010, pp. 1-9.
    • (2010) Proc IEEE Int. Conf. Computer Communications (INFOCOM) , pp. 1-9
    • Xing, K.1    Cheng, X.2
  • 26
    • 77951458841 scopus 로고    scopus 로고
    • Efficient and distributed detection of node replication attacks in mobile sensor networks
    • Anchorage, AK, USA
    • C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, "Efficient and distributed detection of node replication attacks in mobile sensor networks," in Proc. IEEE Vehicular Technology Conf. Fall (VTC-Fall), Anchorage, AK, USA, 2009, pp. 1-5.
    • (2009) Proc. IEEE Vehicular Technology Conf. Fall (VTC-Fall) , pp. 1-5
    • Yu, C.-M.1    Lu, C.-S.2    Kuo, S.-Y.3
  • 27
    • 77955667914 scopus 로고    scopus 로고
    • Noninteractive pairwise key establishment for sensor networks
    • Sep.
    • C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, "Noninteractive pairwise key establishment for sensor networks," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 556-569, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 556-569
    • Yu, C.-M.1    Lu, C.-S.2    Kuo, S.-Y.3
  • 28
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • Hong Kong, China
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," in Proc. IEEE Int. Conf. Computer Communications (INFOCOM), Hong Kong, China, 2004, pp. 2446-2457.
    • (2004) Proc IEEE Int. Conf. Computer Communications (INFOCOM) , pp. 2446-2457
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 29
    • 79957487965 scopus 로고    scopus 로고
    • Practical and secure multidimensional query framework in tiered sensor networks
    • Jun.
    • C.-M. Yu, Y.-T. Tsou, C.-S. Lu, and S.-Y. Kuo, "Practical and secure multidimensional query framework in tiered sensor networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 241-255, Jun. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.2 , pp. 241-255
    • Yu, C.-M.1    Tsou, Y.-T.2    Lu, C.-S.3    Kuo, S.-Y.4
  • 30
    • 77952973912 scopus 로고    scopus 로고
    • Localized multicast: Efficient and distributed replica detection in large-scale sensor networks
    • Jul.
    • B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, "Localized multicast: Efficient and distributed replica detection in large-scale sensor networks," IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 913-926, Jul. 2010.
    • (2010) IEEE Trans. Mobile Comput , vol.9 , Issue.7 , pp. 913-926
    • Zhu, B.1    Setia, S.2    Jajodia, S.3    Roy, S.4    Wang, L.5
  • 31
    • 79952798742 scopus 로고    scopus 로고
    • Random-walk based approach to detect clone attacks in wireless sensor networks
    • Jun.
    • Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie, "Random-walk based approach to detect clone attacks in wireless sensor networks," IEEE J. Sel. Areas Commun., vol. 28, no. 5, pp. 677-691, Jun. 2010.
    • (2010) IEEE J. Sel. Areas Commun , vol.28 , Issue.5 , pp. 677-691
    • Zeng, Y.1    Cao, J.2    Zhang, S.3    Guo, S.4    Xie, L.5
  • 32
    • 71949128840 scopus 로고    scopus 로고
    • Memory efficient protocols for detecting node replication attacks in wireless sensor networks
    • Princeton, NJ, USA
    • M. Zhang, V. Khanapure, S. Chen, and X. Xiao, "Memory efficient protocols for detecting node replication attacks in wireless sensor networks," in Proc. IEEE Int. Conf. Network Protocols (ICNP), Princeton, NJ, USA, 2009, pp. 284-293.
    • (2009) Proc IEEE Int. Conf. Network Protocols (ICNP) , pp. 284-293
    • Zhang, M.1    Khanapure, V.2    Chen, S.3    Xiao, X.4
  • 33
  • 34
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks
    • Oakland, CA, USA
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks," in Proc. IEEE Symp. Security and Privacy (S&P), Oakland, CA, USA, 2004, pp. 259-271.
    • (2004) Proc IEEE Symp. Security and Privacy (S&P) , pp. 259-271
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.