A detection method for replication attacks in wireless sensor networks

Cheng-Yuan Ku*, Yi Chang Lee, Yi Hsien Lin, Yi Wen Chang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Nowadays the wireless sensor networks are widely used in many applications, such as home security monitoring, healthcare applications, and traffic control. However, a new-type attack named node replication attack has been proved to be a harmful attack for wireless sensor networks (WSNs). In this study, we try to propose an improved method which needs less memory overhead and communication cost to detect the so-called node replication attack. Simple analysis shows that this method is efficient. More analyses and detailed simulations will be done in the near future.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Human-Centric Computing 2011 and Embedded and Multimedia Computing 2011, HumanCom and EMC 2011
Pages235-244
Number of pages10
DOIs
StatePublished - 1 Sep 2011
Event4th International Conference on Human-Centric Computing, HumanCom'11 and the 6th International Conference on Embedded and Multimedia Computing, EMC'11 - Enshi, China
Duration: 11 Aug 201113 Aug 2011

Publication series

NameLecture Notes in Electrical Engineering
Volume102 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference4th International Conference on Human-Centric Computing, HumanCom'11 and the 6th International Conference on Embedded and Multimedia Computing, EMC'11
CountryChina
CityEnshi
Period11/08/1113/08/11

Keywords

  • Intrusion detection
  • Node replication attacks
  • Wireless sensor networks (WSNs)

Fingerprint Dive into the research topics of 'A detection method for replication attacks in wireless sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Ku, C-Y., Lee, Y. C., Lin, Y. H., & Chang, Y. W. (2011). A detection method for replication attacks in wireless sensor networks. In Proceedings of the International Conference on Human-Centric Computing 2011 and Embedded and Multimedia Computing 2011, HumanCom and EMC 2011 (pp. 235-244). (Lecture Notes in Electrical Engineering; Vol. 102 LNEE). https://doi.org/10.1007/978-94-007-2105-0_23