作者
Kai Xing, Fang Liu, Xiuzhen Cheng, David HC Du
发表日期
2008/6/17
研讨会论文
2008 The 28th International Conference on Distributed Computing Systems
页码范围
3-10
出版商
IEEE
简介
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attacks by replicating the compromised node, distributing the clones throughout the network, and starting a variety of insider attacks. Previous works against clone attacks suffer from either a high communication/storage overhead or a poor detection accuracy. In this paper, we propose a novel scheme for detecting clone attacks in sensor networks, which computes for each sensor a social fingerprint by extracting the neighborhood characteristics, and verifies the legitimacy of the originator for each message by checking the enclosed fingerprint. The fingerprint generation is based on the superimposed s-disjunct code, which incurs a very light communication and computation overhead. The fingerprint verification is conducted at both the base …
引用总数
20072008200920102011201220132014201520162017201820192020202120222023202411136112028312113121481214621
学术搜索中的文章
K Xing, F Liu, X Cheng, DHC Du - 2008 The 28th International Conference on Distributed …, 2008