首页> 外文期刊>Wireless Networks >Node coloring based replica detection technique in wireless sensor networks
【24h】

Node coloring based replica detection technique in wireless sensor networks

机译:无线传感器网络中基于节点着色的副本检测技术

获取原文
获取原文并翻译 | 示例

摘要

Node replication attack possess a higher level of threat in wireless sensor networks. A replicated node takes advantage of having legal identity of the compromised node to control the network traffic and inject malicious information into the network. Several techniques have been proposed to detect node replication in wireless sensor networks. However, in most of these techniques, the responsibility for replica detection lies either with the base station or a few randomly selected witness nodes. In this paper, we propose a technique for detecting replicas without the participation of base station and witness nodes. In the proposed scheme, each node is assigned with a color (value), which is unique within its neighborhood. A color conflict within the neighborhood of a node is detected as a replica. We made a comparison of the proposed scheme with RED (Conti et al. in IEEE Trans Dependable Secure Comput 8(5):685-698, 2011), LSM (Parno et al. in Proceedings of IEEE symposium on security and privacy. IEEE, pp 49-63, 2005), and SET (Choi et al. in Proceedings of third international conference on security and privacy in communications networks and the workshops, SecureComm 2007. IEEE, pp 341-350, 2007). Parameters considered for comparison are detection probability, communication complexity and storage overhead. We observed that the proposed scheme has a higher detection probability, and lower communication and storage overhead.
机译:节点复制攻击在无线传感器网络中具有更高级别的威胁。复制节点利用了受感染节点的合法身份来控制网络流量并将恶意信息注入网络。已经提出了几种技术来检测无线传感器网络中的节点复制。但是,在大多数这些技术中,副本检测的责任在于基站或一些随机选择的见证节点。在本文中,我们提出了一种无需基站和见证节点参与即可检测副本的技术。在提出的方案中,为每个节点分配了一种颜色(值),该颜色在其邻域内是唯一的。节点附近的颜色冲突被检测为副本。我们将提出的方案与RED(Conti等人,在IEEE Trans Dependable Secure Comput 8(5):685-698,2011),LSM(Parno等人,在IEEE关于安全性和隐私的研讨会论文集)中进行了比较。 ,第49-63页,2005年)和SET(Choi等人在《第三届国际通信网络安全性和隐私性国际会议论文集》和研讨会上,SecureComm2007。IEEE,第341-350页,2007年)。考虑比较的参数是检测概率,通信复杂性和存储开销。我们观察到,提出的方案具有较高的检测概率,并具有较低的通信和存储开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号