scholarly journals Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks

Author(s):  
Yuichi Sei ◽  
Shinichi Honiden
2020 ◽  
Vol 68 ◽  
pp. 647-661
Author(s):  
Hsuan-Yin Lin ◽  
Po-Ning Chen ◽  
Yunghsiang S. Han ◽  
Pramod K. Varshney

Author(s):  
Manjunatha R C ◽  
Rekha K R ◽  
Nataraj K R

<p>Wireless sensor networks are usually left unattended and serve hostile environment, therefore can easily be compromised. With compromised nodes an attacker can conduct several inside and outside attacks. Node replication attack is one of them which can cause severe damage to wireless sensor network if left undetected. This paper presents fuzzy based simulation framework for detection and revocation of compromised nodes in wireless sensor network. Our proposed scheme uses PDR statistics and neighbor reports to determine the probability of a cluster being compromised. Nodes in compromised cluster are then revoked and software attestation is performed.Simulation is carried out on MATLAB 2010a and performance of proposed scheme is compared with conventional algorithms on the basis of communication and storage overhead. Simulation results show that proposed scheme require less communication and storage overhead than conventional algorithms.</p>


Author(s):  
Manjunatha R C ◽  
Rekha K R ◽  
Nataraj K R

<p>Wireless sensor networks are usually left unattended and serve hostile environment, therefore can easily be compromised. With compromised nodes an attacker can conduct several inside and outside attacks. Node replication attack is one of them which can cause severe damage to wireless sensor network if left undetected. This paper presents fuzzy based simulation framework for detection and revocation of compromised nodes in wireless sensor network. Our proposed scheme uses PDR statistics and neighbor reports to determine the probability of a cluster being compromised. Nodes in compromised cluster are then revoked and software attestation is performed.Simulation is carried out on MATLAB 2010a and performance of proposed scheme is compared with conventional algorithms on the basis of communication and storage overhead. Simulation results show that proposed scheme require less communication and storage overhead than conventional algorithms.</p>


2014 ◽  
Vol 68 (10) ◽  
pp. 1022-1029 ◽  
Author(s):  
Mohammad A. Al-Jarrah ◽  
Nedal K. Al-Ababneh ◽  
Mohammad M. Al-Ibrahim ◽  
Rami A. Al-Jarrah

Sign in / Sign up

Export Citation Format

Share Document