Detection of Node Replication Attacks in Mobile Sensor Networks

The advanced sensor network architectures could be used for a variety of applications including intruder detection, border monitoring, and military patrols. In potentially hostile environments, the security of unattended mobile nodes is extremely critical. Due to the unattended nature of wireless sensor networks, an adversary can capture and compromise sensor nodes, make replicas of them, and then mount a variety of attacks with these replicas. These replica node attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network.

Provided by: International Journal of Electronics and Computer Science Engineering Topic: Mobility Date Added: Aug 2012 Format: PDF

Download Now

Find By Topic