Replication Attack Mitigations for Static and Mobile WSN

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

12 pages

Scientific paper

10.5121/ijnsa.2011.3210

Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can re-program it and replicate the node in order to eavesdrop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone and sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. This paper analyzes the threat posed by the replication attack and several novel techniques to detect and defend against the replication attack, and analyzes their effectiveness in both static and mobile WSN.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Replication Attack Mitigations for Static and Mobile WSN does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Replication Attack Mitigations for Static and Mobile WSN, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Replication Attack Mitigations for Static and Mobile WSN will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-247971

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.