Deterministic detection of node replication attacks in sensor networks

Yu Shen Ho, Ruay Lien Ma, Cheng En Sung, I. Chen Tsai, Li Wei Kang, Chia Mu Yu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

In Wireless Sensor Networks (WSNs), because sensor nodes do not equip with tamper resistance hardwares, they are vulnerable to the capture and compromise performed by the adversary. By launching the node replication attack, the adversary can place the replicas of captured sensor nodes back into the sensor networks so as to eavesdrop the transmitted messages or compromise the functionality of the network. Although several protocols are proposed to defend against node replication attacks, all the proposed methods can only detect the node replication attacks probabilistically. In this paper, we propose Quorum-Based Multicast (QBM) and Star-shape Line-Selected Multicast (SLSM) to detect the node replication attacks, both of which can deterministically detect the replicas.

Original languageEnglish
Title of host publication2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages468-469
Number of pages2
ISBN (Electronic)9781479987443
DOIs
StatePublished - 20 Aug 2015
Event2nd IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015 - Taipei, Taiwan
Duration: 6 Jun 20158 Jun 2015

Publication series

Name2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015

Conference

Conference2nd IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015
CountryTaiwan
CityTaipei
Period6/06/158/06/15

Keywords

  • Cloning
  • Hardware
  • Mobile communication
  • Probabilistic logic
  • Protocols
  • Security
  • Wireless sensor networks

Fingerprint Dive into the research topics of 'Deterministic detection of node replication attacks in sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Ho, Y. S., Ma, R. L., Sung, C. E., Tsai, I. C., Kang, L. W., & Yu, C. M. (2015). Deterministic detection of node replication attacks in sensor networks. In 2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015 (pp. 468-469). [7217002] (2015 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICCE-TW.2015.7217002