2009
DOI: 10.1016/j.adhoc.2009.04.008
|View full text |Cite
|
Sign up to set email alerts
|

Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
46
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 53 publications
(46 citation statements)
references
References 20 publications
0
46
0
Order By: Relevance
“…This technique falls into the category of group-based techniques. Ho et al [54] have proposed three group deployment knowledge-based schemes for the detection of node replication attack in wireless sensor networks. Their schemes are based on the assumption that nodes are deployed in groups.…”
Section: Distributed Detection Of Replication With Deployment Knowledmentioning
confidence: 99%
See 1 more Smart Citation
“…This technique falls into the category of group-based techniques. Ho et al [54] have proposed three group deployment knowledge-based schemes for the detection of node replication attack in wireless sensor networks. Their schemes are based on the assumption that nodes are deployed in groups.…”
Section: Distributed Detection Of Replication With Deployment Knowledmentioning
confidence: 99%
“…For neighbor-based technique [48], the neighboring nodes should be static and any addition or removal of nodes is not possible throughout the detection process because in doing so the detection process is affected severely. For the generation-or group-based techniques [40,41,54,55] all the nodes are deployed in groups, and no new node can be added in a particular group. Also, nodes should have location or network information before node deployment.…”
Section: Distributed Techniquesmentioning
confidence: 99%
“…Zhu et al [8] proposed another detection scheme by using localized multicast. Ho et al [9] proposed to take advantage of the group deployment knowledge to further raise detection probability and lower detection overheads. Zhang et al [10] proposed four detection schemes, B-MEM, BC-MEM, C-MEM, and CC-MEM, to address the cross-over problem and the crowded-center problem in the detection.…”
Section: Distributed Detection Approachesmentioning
confidence: 99%
“…In distributed approaches [2,[7][8][9][10][11][12][13][14], the replication attacks detection is conducted by reporting the location claim messages to randomly chosen witness nodes in the network. Paradoxes of the location claims indicate the detection of replication attacks.…”
Section: Distributed Detection Approachesmentioning
confidence: 99%
“…Ho et al [14] leverages group deployment knowledge to detect static replica nodes with little overhead.…”
Section: Related Workmentioning
confidence: 99%