Smart Wireless Sensor Networks 2010
DOI: 10.5772/13084
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Detection of Node Capture Attacks in Wireless Sensor Networks

Abstract: Wireless sensor networks are vulnerable to node capture attacks because sensor nodes are usually deployed in unattended manner. Once attacker captures sensor nodes, he can compromise them and launch various types of attacks with those compromised nodes. Therefore, node capture attacks are hazardous and should be detected as soon as possible to reduce the harm incurred by them. To meet this need, we propose a node capture detection scheme in wireless sensor networks. Our scheme detects the captured sensor nodes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(20 citation statements)
references
References 47 publications
0
20
0
Order By: Relevance
“…The LSM scheme reduces the communication overhead of the RM scheme by having every claim-relaying node participate in the replica detection and revocation process. RED still has the same communication overhead as the LSM scheme [24]. …”
Section: Communication Overheadmentioning
confidence: 90%
See 1 more Smart Citation
“…The LSM scheme reduces the communication overhead of the RM scheme by having every claim-relaying node participate in the replica detection and revocation process. RED still has the same communication overhead as the LSM scheme [24]. …”
Section: Communication Overheadmentioning
confidence: 90%
“…The protocol then measures the absence time period of a sensor node and compares it to a predefined threshold. If it is more than threshold value, the sensor node considered as a captured node [24].…”
Section: Detection Of Node Capture Attack (Dnca)mentioning
confidence: 99%
“…Some works examine the possibility of detecting the compromising of nodes as soon as an opponent physically withdraws them from the network. In the method that is developed in [16], each node keeps a watch on the presence of its neighbours. The Sequential Probability Radio Test (SPRT) is used to determine a dynamic time threshold.…”
Section: Ddos and Wsnsmentioning
confidence: 99%
“…This is achieved using third scheme (Random Pair wise Keys Scheme). With these schemes improved resilience against node capture attacks as well as node replication can be obtained The scheme presented by [8] quickly observes compromised node through Sequential Probability Ratio Test (SPRT). The absence of captured node is found out through pre-defined threshold limit.…”
Section: Survey Of Various Detection and Key Predistribution Schemes mentioning
confidence: 99%