{"title":"A Secure Virtual Verification Model for Wireless Sensor Network","authors":"Yang Li, Yingjie Xia, Guo-hua Zhan","doi":"10.1109/CSO.2010.78","DOIUrl":null,"url":null,"abstract":"the wireless sensor network provides neighbor discovery (ND) mechanism to build the dynamic route path. However, it makes attacks against easy: An adversary can simply replay or relay (wormhole) packets across the network and mislead disconnected nodes into believing that they communicate directly. Prior works on secure ND are to verify the neighbor is trustful. However, they either rely on specialized hardware or infrastructure, or offer limited security. In this paper, we announce a semantic architecture of secure agent verification model, which provides a challenge protocol against the classic 2-end wormhole attack. Also, the experiment results are discussed for the performance and accuracy.","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Third International Joint Conference on Computational Science and Optimization","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSO.2010.78","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
the wireless sensor network provides neighbor discovery (ND) mechanism to build the dynamic route path. However, it makes attacks against easy: An adversary can simply replay or relay (wormhole) packets across the network and mislead disconnected nodes into believing that they communicate directly. Prior works on secure ND are to verify the neighbor is trustful. However, they either rely on specialized hardware or infrastructure, or offer limited security. In this paper, we announce a semantic architecture of secure agent verification model, which provides a challenge protocol against the classic 2-end wormhole attack. Also, the experiment results are discussed for the performance and accuracy.