Naruephiphat et al., 2012 - Google Patents
An area-based approach for node replica detection in wireless sensor networksNaruephiphat et al., 2012
- Document ID
- 18284878491030158759
- Author
- Naruephiphat W
- Ji Y
- Charnsripinyo C
- Publication year
- Publication venue
- 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
External Links
Snippet
Typical wireless sensor networks have restricted resources on memory capacity, computing/processing power, and energy supply. However, wireless sensor network has been increasingly applied to various applications and security in wireless sensor networks …
- 238000001514 detection method 0 title abstract description 40
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Naruephiphat et al. | An area-based approach for node replica detection in wireless sensor networks | |
Yang et al. | Toward resilient security in wireless sensor networks | |
Dorri et al. | Security challenges in mobile ad hoc networks: A survey | |
Deng et al. | Countermeasures against traffic analysis attacks in wireless sensor networks | |
Ali et al. | Detection and prevention of Black Hole Attacks in IOT & WSN | |
Janardhanan et al. | An efficient reactive routing security scheme based on RSA algorithm for preventing false data injection attack in WSN | |
Yamini et al. | Improving routing disruption attack detection in MANETs using efficient trust establishment | |
Han et al. | Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks | |
Tayal et al. | A survey of attacks on manet routing protocols | |
Arfat et al. | A survey on secure routing protocols in wireless sensor networks | |
Poornima et al. | Secure data collection using mobile data collector in clustered wireless sensor networks | |
Al-Nasser et al. | A comprehensive survey on routing and security in mobile wireless sensor networks | |
Umar et al. | SeCRoP: secure cluster head centered multi‐hop routing protocol for mobile ad hoc networks | |
Jamshidi et al. | A dynamic ID assignment mechanism to defend against node replication attack in static wireless sensor networks | |
Lalar et al. | An efficient tree-based clone detection scheme in wireless sensor network | |
Saini et al. | Detection of malicious cluster head causing hello flood attack in LEACH protocol in wireless sensor networks | |
Mr et al. | Design and implementation of trust based approach to mitigate various attacks in mobile ad hoc network | |
Laeeq | Security challenges & preventions in wireless communications | |
Messai et al. | Tree based protocol for key management in wireless sensor networks | |
Zhou et al. | Multi-branch source location privacy protection scheme based on random walk in WSNs | |
Kumar et al. | Mitigation of Replication Attack Detection in Clusters through a Mobile Agent in Wireless Sensor Networks | |
Kumar et al. | To mitigate black hole attack in AODV | |
Al-Karaki | Analysis of routing security-energy trade-offs in wireless sensor networks | |
Singh et al. | Survey of secure routing protocols in MANET | |
Grewal et al. | A survey on proficient techniques to mitigate clone attack in wireless sensor networks |