Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks
#1

Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks
Using Sequential Hypothesis Testing


[attachment=16310]

INTRODUCTION

ADVANCES in robotics have made it possible to develop a
variety of new architectures for autonomous wireless
networks of sensors. Mobile nodes, essentially small robots
with sensing, wireless communications, and movement
capabilities, are useful for tasks such as static sensor
deployment, adaptive sampling, network repair, and event
detection [4]. These advanced sensor network architectures
could be used for a variety of applications including
intruder detection, border monitoring, and military patrols.
In potentially hostile environments, the security of unattended
mobile nodes is extremely critical. The attacker
may be able to capture and compromise mobile nodes, and
then use them to inject fake data, disrupt network
operations, and eavesdrop on network communications.


2 PROBLEM DEFINITION
In this section, we first state the problem and the network
assumptions for our proposed scheme and then describe
the attacker models we use to evaluate our approach.


2.1 Problem Statement
We define a mobile replica node as a node having the
same ID and secret keying materials as a mobile node u. An
adversary creates replica node as follows: He first
compromises node u and extracts all secret keying materials
from it. Then, he prepares a new node u0, sets the ID of u0 to
the same as u, and loads u’s secret keying materials into u0.
There may be multiple replicas of u, e.g.,

there may be multiple compromised and replicated nodes.
Our goal is to detect the fact that both u and u0 (or u0

operate as separate entities with the same identity and keys.

2.2 Network Assumptions
We consider a two-dimensional mobile sensor network
where sensor nodes freely roam throughout the network.
We assume that every mobile sensor node’s movement is
physically limited by the system-configured maximum
speed, Vmax. We also assume that all direct communication
links between sensor nodes are bidirectional. This communication
model is common in the current generation of
sensor networks.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: image replica detection, wireless security attacks, wireless sensor networks attacks and countermeasures in powerpoint format, detection and localization of multiple spoofing attacks in wireless networks ppt, attacks in wireless sensor networks report, image replica detectiones in orissa**tem project in java, distributed detection of clone attacks in wireless sensor networks ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Image Processing for Skin Cancer Detection seminar paper 5 3,958 17-03-2016, 11:42 AM
Last Post: seminar report asees
  Wireless LAN Security FULL REPORT seminar details 3 5,133 06-11-2014, 09:23 PM
Last Post: seminar report asees
  Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networksy seminar addict 1 1,508 25-08-2014, 05:40 PM
Last Post: Guest
  Walking Stick With Heart Attack Detection seminars report seminar addict 4 4,315 10-02-2013, 06:32 PM
Last Post: Guest
  Mobile Number Portability project uploader 1 2,028 11-01-2013, 12:38 PM
Last Post: seminar details
  Mobile Ad Hoc Networks project uploader 1 1,753 20-12-2012, 12:31 PM
Last Post: seminar details
  Mobile Application Development with ANDROID seminar addict 1 3,175 29-11-2012, 02:28 PM
Last Post: seminar details
  3G WIRELESS TECHNOLOGY:- project uploader 1 1,656 27-11-2012, 01:03 PM
Last Post: seminar details
  WIRELESS TECHNOLOGY project uploader 1 1,501 27-11-2012, 01:03 PM
Last Post: seminar details
  Current generation moves into wireless technology project uploader 1 1,667 27-11-2012, 01:03 PM
Last Post: seminar details

Forum Jump: