CSI: Compressed sensing-based clone identification in sensor networks

Chia Mu Yu*, Chun Shien Lu, Sy Yen Kuo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Scopus citations

Abstract

The clone detection, aiming to detect the illegal copies with all of the credentials of legitimate sensor nodes, is of great importance for sensor networks because of the substantial impact of clones on network operations like routing, data collection, and key distribution, etc. Based on a state-of-the-art signal processing technique, compressed sensing, we propose a novel clone detection method, called CSI. Not only is the design philosophy fundamentally different from the existing methods, but also it has the lowest communication cost among all detection methods. The performance and security of CSI will be demonstrated by numerical simulations and analyses.

Original languageEnglish
Title of host publication2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012
Pages290-295
Number of pages6
DOIs
StatePublished - 2012
Event2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012 - Lugano, Switzerland
Duration: 19 Mar 201223 Mar 2012

Publication series

Name2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012

Conference

Conference2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012
CountrySwitzerland
CityLugano
Period19/03/1223/03/12

Keywords

  • Clone
  • Network security
  • Node replication attack
  • Sensor networks

Fingerprint Dive into the research topics of 'CSI: Compressed sensing-based clone identification in sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Yu, C. M., Lu, C. S., & Kuo, S. Y. (2012). CSI: Compressed sensing-based clone identification in sensor networks. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012 (pp. 290-295). [6197497] (2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012). https://doi.org/10.1109/PerComW.2012.6197497