Khan, W.Z. and Aalsalem, M.Y. and Saad, M.N.M. (2013) Detection of masked replication attack in wireless sensor networks. In: UNSPECIFIED.
Full text not available from this repository.Abstract
Wireless sensor networks are vulnerable to a wide variety of threats and node replication attack is of the most critical concern. In node replication attack, an adversary creates many replicas after compromising and obtaining all the secret credentials of the captured node. These replicas are deployed by an adversary at strategic positions of the network in order to launch many insidious attacks within the sensor network. Node replication attack becomes more sophisticated and harmful when it appears in the form of masked replication attack. In masked replication attack all the neighbors of a clone node are compromised so that an adversary is able to shelter its clone node from being detected by the detection process. To counter node replication attack many witness based techniques have been proposed but almost of them are unable to detect masked replication attack. Some of the existing witness based techniques proposed for the node replication attack have promising results for countering node replication attack but not a single one of them have provided a solution for masked replication attack which is a specialized type of node replication attack. © 2013 AISTI.
Item Type: | Conference or Workshop Item (UNSPECIFIED) |
---|---|
Additional Information: | cited By 0; Conference of 8th Iberian Conference on Information Systems and Technologies, CISTI 2013 ; Conference Date: 19 June 2013 Through 22 June 2013; Conference Code:100955 |
Uncontrolled Keywords: | Detection process; Masked ReplicationAttack; Node Replication Attack; Security, Cloning; Information systems; Wireless sensor networks, Sensor nodes |
Depositing User: | Mr Ahmad Suhairi UTP |
Date Deposited: | 09 Nov 2023 15:51 |
Last Modified: | 09 Nov 2023 15:51 |
URI: | https://khub.utp.edu.my/scholars/id/eprint/3338 |