[go: up one dir, main page]

Naruephiphat et al., 2012 - Google Patents

An area-based approach for node replica detection in wireless sensor networks

Naruephiphat et al., 2012

Document ID
18284878491030158759
Author
Naruephiphat W
Ji Y
Charnsripinyo C
Publication year
Publication venue
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications

External Links

Snippet

Typical wireless sensor networks have restricted resources on memory capacity, computing/processing power, and energy supply. However, wireless sensor network has been increasingly applied to various applications and security in wireless sensor networks …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Similar Documents

Publication Publication Date Title
Naruephiphat et al. An area-based approach for node replica detection in wireless sensor networks
Yang et al. Toward resilient security in wireless sensor networks
Dorri et al. Security challenges in mobile ad hoc networks: A survey
Deng et al. Countermeasures against traffic analysis attacks in wireless sensor networks
Ali et al. Detection and prevention of Black Hole Attacks in IOT & WSN
Janardhanan et al. An efficient reactive routing security scheme based on RSA algorithm for preventing false data injection attack in WSN
Yamini et al. Improving routing disruption attack detection in MANETs using efficient trust establishment
Han et al. Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks
Tayal et al. A survey of attacks on manet routing protocols
Arfat et al. A survey on secure routing protocols in wireless sensor networks
Poornima et al. Secure data collection using mobile data collector in clustered wireless sensor networks
Al-Nasser et al. A comprehensive survey on routing and security in mobile wireless sensor networks
Umar et al. SeCRoP: secure cluster head centered multi‐hop routing protocol for mobile ad hoc networks
Jamshidi et al. A dynamic ID assignment mechanism to defend against node replication attack in static wireless sensor networks
Lalar et al. An efficient tree-based clone detection scheme in wireless sensor network
Saini et al. Detection of malicious cluster head causing hello flood attack in LEACH protocol in wireless sensor networks
Mr et al. Design and implementation of trust based approach to mitigate various attacks in mobile ad hoc network
Laeeq Security challenges & preventions in wireless communications
Messai et al. Tree based protocol for key management in wireless sensor networks
Zhou et al. Multi-branch source location privacy protection scheme based on random walk in WSNs
Kumar et al. Mitigation of Replication Attack Detection in Clusters through a Mobile Agent in Wireless Sensor Networks
Kumar et al. To mitigate black hole attack in AODV
Al-Karaki Analysis of routing security-energy trade-offs in wireless sensor networks
Singh et al. Survey of secure routing protocols in MANET
Grewal et al. A survey on proficient techniques to mitigate clone attack in wireless sensor networks