Clone wars: Distributed detection of clone attacks in mobile WSNs (Articolo in rivista)

Type
Label
  • Clone wars: Distributed detection of clone attacks in mobile WSNs (Articolo in rivista) (literal)
Anno
  • 2014-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1016/j.jcss.2013.06.017 (literal)
Alternative label
  • Conti M.; Di Pietro R.; Spognardi A. (2014)
    Clone wars: Distributed detection of clone attacks in mobile WSNs
    in Journal of computer and system sciences (Print)
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • Conti M.; Di Pietro R.; Spognardi A. (literal)
Pagina inizio
  • 654 (literal)
Pagina fine
  • 669 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://www.scopus.com/inward/record.url?eid=2-s2.0-84891939593&partnerID=q2rCbXpz (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
  • 80 (literal)
Rivista
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroFascicolo
  • 3 (literal)
Note
  • Scopu (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • Department of Mathematics, Università di Padova, Via Trieste 63, 35131 Padua, Italy; Department of Mathematics, Università di Roma Tre, L.go S. L. Murialdo 4, 00146 Rome, Italy; Institute of Informatics and Telematics of CNR, Via G. Moruzzi 1, 56124 Pisa, Italy (literal)
Titolo
  • Clone wars: Distributed detection of clone attacks in mobile WSNs (literal)
Abstract
  • Among security challenges raised by mobile Wireless Sensor Networks, clone attack is particularly dreadful since it makes an adversary able to subvert the behavior of a network just leveraging a few replicas of some previously compromised sensors. In this work, we provide several contributions: first, we introduce two novel realistic adversary models, the vanishing and the persistent adversary, characterized by different compromising capability. We then propose two distributed, efficient, and cooperative protocols to detect replicas: History Information-exchange Protocol (HIP) and its optimized version (HOP). Both HIP and HOP leverage just local (one-hop) communications and node mobility, and differ for the amount of computation required. We study their behavior against the introduced types of attacker, considering two different mobility models and comparing our solutions against the state of the art. Both analysis and simulation results show that our solutions are effective and efficient, providing high detection rate, while incurring limited overhead. © 2013 Elsevier Inc. (literal)
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
Insieme di parole chiave di
data.CNR.it