Secure & robust RED (SR-RED)

Khan, W.Z. and Aalsalem, M.Y. and Saad, M.N.M. (2013) Secure & robust RED (SR-RED). In: UNSPECIFIED.

Full text not available from this repository.
Official URL: https://www.scopus.com/inward/record.uri?eid=2-s2....

Abstract

In the security of wireless sensor networks, node replication attack is the most critical concern. In node replication attack, an adversary compromises the captured node and replicates the node, creating many replicas with the same node identity by obtaining all the secrets of the nodes. After this an adversary may launch many insidious attacks within the sensor network. So far, Randomized, Efficient and Distributed (RED) is considered to be the most promising distributed solution for detecting clone nodes but it also has some stern, stunning and uncompromising shortcomings. The contributions of this paper are twofold. First, we have presented a distributed and non-deterministic solution, removing the drawbacks of RED by making enhancements in order to identify and revoke clones. Finally, we have proposed a method for the detection of masked replication attack which is another form or variation of Node replication attack. © 2013 IEEE.

Item Type: Conference or Workshop Item (UNSPECIFIED)
Additional Information: cited By 0; Conference of 2013 20th International Conference on Telecommunications, ICT 2013 ; Conference Date: 6 May 2013 Through 8 May 2013; Conference Code:104525
Uncontrolled Keywords: Cloning; Information technology; Wireless sensor networks, Distributed solutions; Masked Replication Attack; Node Replication Attack; Security; Security of wireless sensor networks, Sensor nodes
Depositing User: Mr Ahmad Suhairi UTP
Date Deposited: 09 Nov 2023 15:52
Last Modified: 09 Nov 2023 15:52
URI: https://khub.utp.edu.my/scholars/id/eprint/3838

Actions (login required)

View Item
View Item