2005 IEEE Symposium on Security and Privacy (S&P'05)
DOI: 10.1109/sp.2005.8
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Detection of Node Replication Attacks in Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
581
0
4

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 513 publications
(587 citation statements)
references
References 26 publications
2
581
0
4
Order By: Relevance
“…Recent clone detection schemes such as randomized efficient and distributed (RED) [5] and line-select mu lticast (LSM) protocol [7], fail to guarantee both requirements of use random witnesses selection and a significant probability of clone detection. For examp le; RED protocol attains a high clone detection rate with the assistance of deterministic mapping function in witness selection.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Recent clone detection schemes such as randomized efficient and distributed (RED) [5] and line-select mu lticast (LSM) protocol [7], fail to guarantee both requirements of use random witnesses selection and a significant probability of clone detection. For examp le; RED protocol attains a high clone detection rate with the assistance of deterministic mapping function in witness selection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To counter these attacks security measures have been proposed [1][2][3][4][5][6][7]. Most of the methods focus on having high detection ratio of these attacks without network lifetime being of major concern.…”
Section: Introductionmentioning
confidence: 99%
“…Proposals are also made when to isolate a misbehaving node based on the criticality of that node in maintaining the connectivity [14]. There is also a rich literature on detecting DoS and node replication attacks in sensor networks [9,11].…”
Section: Related Workmentioning
confidence: 99%
“…Replicas can launch a variety of attacks such as creating a black hole or initiating a wormhole attack [6]- [8]. There are a number of solutions for detecting node replication attacks in wireless sensor networks [9], [10].…”
Section: Introductionmentioning
confidence: 99%