{"title":"Early and Lightweight Distributed Detection of Node Replication Attack in Sensor Networks","authors":"T. Dai, J. Agbinya","doi":"10.1109/WCNC.2010.5506482","DOIUrl":null,"url":null,"abstract":"An increasing body of protocols has been proposed in recent years for detecting node replication attack in sensor networks. Most of them however expose the following limitations: high performance overheads, unreasonable assumptions, etc. To address these issues, we propose two new protocols in this paper: LANCE and SACRED. LANCE is designed to be light-weight in performance at the cost of slightly weaker security robustness while SACRED obtains much greater security by trading off small performance. Theoretical analysis and simulations have also been conducted to evaluate the protocols in terms of security features and performance overheads.","PeriodicalId":102524,"journal":{"name":"2010 IEEE Wireless Communication and Networking Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Wireless Communication and Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCNC.2010.5506482","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
An increasing body of protocols has been proposed in recent years for detecting node replication attack in sensor networks. Most of them however expose the following limitations: high performance overheads, unreasonable assumptions, etc. To address these issues, we propose two new protocols in this paper: LANCE and SACRED. LANCE is designed to be light-weight in performance at the cost of slightly weaker security robustness while SACRED obtains much greater security by trading off small performance. Theoretical analysis and simulations have also been conducted to evaluate the protocols in terms of security features and performance overheads.