A Detection Scheme against Node Replication Attack in Wireless Sensor Network Based on Bloom Filter and QR Decomposition

Article Preview

Abstract:

Based on the bloom filter and QR decomposition, a detection scheme against node replication attack in wireless sensor network was proposed. The scheme used the bloom filter to generate the geographic fingerprints of the nodes. According to the principle that the same ID cannot have two different geographical locations, when the receiver found the conflicting fingerprint, the node replication attack was detected. Matrix QR decomposition can guarantee the network security and provide verification of the link

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1093-1096

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Modares, H., R. Salleh and A. Moravejosharieh, 2011. Overview of security issues in wireless sensor networks. Proceedings of the 3rd International Conference on Computational Intelligence, Modelling and Simulation, September 20-22, 2011, pp: 308-311.

DOI: 10.1109/cimsim.2011.62

Google Scholar

[2] Huang, J. and G.H. Ou, A Public Key Polynomial-based Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks. Ad Hoc & Sensor Wireless Networks, 2012, 16(1-3): 45-64.

DOI: 10.1016/j.adhoc.2017.12.006

Google Scholar

[3] T. Eren, D. Goldenberg, W. Whitley, Y. Yang, S. Morse, B. Anderson, and P. Belhumeur, Rigidity, Computation, and Randomization of Network Localization., In Proc. of IEEE INFOCOM, March (2004).

DOI: 10.1109/infcom.2004.1354686

Google Scholar

[4] D. Goldenberg, A. Krishnamurthy, W. Maness, Network Localization in Partially Localizable Networks, In Proc. of IEEE INFOCOM, March (2005).

Google Scholar

[5] Niu G, Lian J, Ma B. QR decomposition and genetic algorithm based optimized layout of sensors for hydraulic structures[J]. Shuili Shuidian Jishi(Water Resources and Hydropower Engineering), 2012, 43(6).

Google Scholar

[6] Bloom, B. Space/time Trade-offs in Hash Coding with Allowable Errors. Communications of the ACM, 13 (7). 422-426. July (1970).

DOI: 10.1145/362686.362692

Google Scholar