On Node Replication Attack in Wireless Sensor Networks
Keywords: Wireless Sensor Networks Security, Node Replication, Clone Node Attack
Mehran University Research Journal of Engineering & Technology
Volume 34 , Issue 4
Mumtaz Qabulio , Yasir Arfat Malkani , Ayaz Ahmed Keerio ,
References
1. |
Padmavathi, G.M.D.S., “A Survey of Attacks, Security
Mechanisms and Challenges in Wireless Sensor
Networksâ€, International Journal of Computer Science
and Information Security, Volume 4, No. 1, 2009 |
2. |
Singh, M.M., Ankita, S., and Jyotsna, K.M., “Towards
Techniques of Detecting Node Replication Attack in
Static Wireless Sensor Networksâ€, International Journal
of Information and Computation Technology,
Volume 4, No. 2, 2014 |
3. |
Ansari, M.H.V.T., “Classification And Aanalysis Of Clone
Attack Detection Procedures in Mobile Wireless Sensor
Networksâ€, International Journal of Scientific and
Research Publications, Volume 2, No. 11, 2012 |
4. |
Sagar, C.J.G.N., “Survey on Distributed Detection of
Clone Attacks in Wireless Sensor Networksâ€, 2014 |
5. |
Choi, H., and Thomas, S.Z., “SET: Detecting Node
Clones in Sensor Networksâ€, Proceedings of 3 rd
International Conference on Security and Privacy in
Communications Networks and the WorkshopsSecureComm, 2007 |
6. |
Bekara, C., "Defending Against Nodes Replication
Attacks on Wireless Sensor Networks", 2012. |
7. |
Yu, C.M., "CSI: Compressed Sensing-Based Clone
Identification in Sensor Networks", Proceedings of 8th
IEEE International Workshop on Sensor Networks and
Systems for Pervasive Computing, 2012 |
8. |
Parno, B.J., "Distributed Detection of Node Replication
Attacks in Sensor Networks", Master Thesis, 2005. |
9. |
Bryan, P.A.P, and Gligor, V., "Distributed Detection of
Node Replication Attacks in Sensor Networks", IEEE
Symposium on Security and Privacy, pp. 49-63, 2005 |
10. |
Conti, C., "A Randomized, Efficient, and Distributed
Protocol for the Detection of Node Replication Attacks
in Wireless Sensor Networks", Proceedings of 8th ACM
International Symposium on Mobile Ad Hoc Networking
and Computing, 2007 |
11. |
Conti, M., "Distributed Detection of Clone Attacks in
Wireless Sensor Networks", IEEE Transaction on
Dependable and Secure Computing, 2011 |
12. |
Zeng, Y., "Random-Walk Based Approach to Detect
CloneAttacks in Wireless Sensor Networks", IEEE
Journal on Selected Areas in Communications,
Volume 28, No. 5, 2010 |
13. |
Li, Z., and Gong, G., “Randomly Directed Exploration:
An Efficient Node Clone Detection Protocol in Wireless
Sensor Networks”, IEEE 6th International Conference
on Mobile Ad Hoc and Sensor Systems, 2009 |
14. |
Znaidi, W.M.M., and Ubeda, S., "Hierarchical Node
Replication Attacks Detection in Wireless Sensor
Networks", International Journal of Distributed Sensor
Networks, 2013 |
15. |
Xia, D., and Vlajic, N., "Near-Optimal Node Clustering
in Wireless sensor Networks for Environment
Monitoring", Proceedings of IEEE 21st International
Conference on Advanced Information Networking and
Applications, 2007. |
16. |
Zhu, B., "Efficient Distributed Detection of Node
Replication Attacks in Sensor Networks", Proceedings
of IEEE 23rd International Conference on Computer
Security Applications, 2007 |
17. |
Zhang, M., "Memory Efficient Protocols for Detecting
Node Replication Attacks in Wireless Sensor Networks",
Proceedings of 17th IEEE International Conference on
Neywork Protocols, 2009 |
18. |
Ho, J.W., "Fast Detection of Replica Node Attacks in
Mobile Sensor Networks Using Sequential Analysis",
INFOCOM, 2009. |
19. |
Abraham, W., "Sequential Tests of Statistical
Hypotheses", The Annals of Mathematical Statistics,
1945. |
20. |
Raja, G., "Efficient Detection of Node Replication
Attacks in Mobile Sensor Networks", International
Journal of Innovative Research in Computer and
Communication Engineering, Volume 2, No. 2, 2014 |
21. |
Balaji, N., and Anitha, M., "Efficient Distributed
Detection of Node Replication Attacks in Mobile Sensor
Networks", International Journal of Research in
Engineering and Technology, 2014. |
22. |
Yu, C.M., "Mobile Sensor Network Resilient Against
Node Replication Attacks", 5th Annual IEEE
Communications Society Conference Sensor on Mesh
and Ad Hoc Communications and Networks, 2008. |
23. |
Yu, C.M., "Efficient and Distributed Detection of Node
Replication Attacks in Mobile Sensor Networks",
Proceedings of IEEE Conference on Vehicular
Technology, 2009. |
24. |
Loua, Y., "Single Hop Detection of Node Clone Attacks
in Mobile Wireless Sensor Networks", Procedia
Engineering, Volume 29, 2012 |
25. |
Deng, X., "Mobility-Assisted Detection of the
Replication Attacks in Mobile Wireless Sensor
Networks", Proceedings of 6th International Conference
on Wireless and Mobile Computing, Networking and
Communications, 2010. |
26. |
Jian1, H., "A Range-Based Detection Method of
Replication Attacks in Wireless Sensor Networks",
Proceedings of International Conference on Information
and Computer Networks, 2012. |
27. |
Ko, L.C., "A Neighbor-Based Detection Scheme for
Wireless Sensor Networks Against Node Replication
Attacks", International Conference on Ultra Modern
Telecommunications & Workshops, 2009 |
28. |
Khan, W.Z., and Mohammed, Y., "Detection and
Mitigation of Node Replication Attacks in Wireless Sensor
Networks: A Survey", International Journal of Distributed
Sensor Networks, Volume 2013, pp. 22, Article ID
149023, 2013. |
29. |
Khan, W.Z., Saad, M.N.B.M., Mohammed, Y.,
"Scrutinising Well-Known Countermeasures Against
Clone Node Attack in Mobile Wireless Sensor Networks",
International Journal of Grid and Utility Computing,
Volume 4, No. 2, pp. 119-127, 2013. |
|
|
|