Khan, W.Z. and Aalsalem, M.Y. and Saad, M.N.M. (2013) Secure & robust RED (SR-RED). In: UNSPECIFIED.
Full text not available from this repository.Abstract
In the security of wireless sensor networks, node replication attack is the most critical concern. In node replication attack, an adversary compromises the captured node and replicates the node, creating many replicas with the same node identity by obtaining all the secrets of the nodes. After this an adversary may launch many insidious attacks within the sensor network. So far, Randomized, Efficient and Distributed (RED) is considered to be the most promising distributed solution for detecting clone nodes but it also has some stern, stunning and uncompromising shortcomings. The contributions of this paper are twofold. First, we have presented a distributed and non-deterministic solution, removing the drawbacks of RED by making enhancements in order to identify and revoke clones. Finally, we have proposed a method for the detection of masked replication attack which is another form or variation of Node replication attack. © 2013 IEEE.
Item Type: | Conference or Workshop Item (UNSPECIFIED) |
---|---|
Additional Information: | cited By 0; Conference of 2013 20th International Conference on Telecommunications, ICT 2013 ; Conference Date: 6 May 2013 Through 8 May 2013; Conference Code:104525 |
Uncontrolled Keywords: | Cloning; Information technology; Wireless sensor networks, Distributed solutions; Masked Replication Attack; Node Replication Attack; Security; Security of wireless sensor networks, Sensor nodes |
Depositing User: | Mr Ahmad Suhairi UTP |
Date Deposited: | 09 Nov 2023 15:52 |
Last Modified: | 09 Nov 2023 15:52 |
URI: | https://khub.utp.edu.my/scholars/id/eprint/3838 |