Energy-efficient replica detection for resource-limited mobile devices in the internet of things
- Authors
- Cho, Kwantae; Lee, Byung-Gil; Lee, Kyungho; Lee, Dong Hoon
- Issue Date
- 17-12월-2013
- Publisher
- INST ENGINEERING TECHNOLOGY-IET
- Keywords
- mobile computing; security of data; Internet of Things; zero detection errors; mobile applications; secret information; malicious code; replica attacks; end-user privacy; intelligent collaboration; Internet of things; resource limited mobile devices; energy efficient replica detection
- Citation
- IET COMMUNICATIONS, v.7, no.18, pp.2141 - 2150
- Indexed
- SCIE
SCOPUS
- Journal Title
- IET COMMUNICATIONS
- Volume
- 7
- Number
- 18
- Start Page
- 2141
- End Page
- 2150
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/101279
- DOI
- 10.1049/iet-com.2013.0283
- ISSN
- 1751-8628
- Abstract
- The forthcoming Internet of Things - an intelligent collaboration of resource-limited static/mobile devices that are embedded in the daily lives of users - poses new challenges to security and end-user privacy. One of the most challenging problems is how to thwart replica attacks. Once a device is captured physically by an attacker or contaminated by malicious code, it can be reprogrammed and the secret information inside can be duplicated into a large number of replicas that maliciously occupy the network and collect users private information without authorisation. In this study, the authors focus on studying the detection of replicas in mobile applications; which can consist of resource-limited static devices attached to mobile entities. Most existing solutions for detecting replicas have been designed for static devices, and cannot be immediately applied to mobile devices because of their unique properties, in particular, their node mobility. The authors present two efficient methods for detecting replicas in mobile devices. Through performance evaluations, they find that the proposed methods provide highly accurate replica detection with nearly zero detection errors. Furthermore, the distributed and cooperative strategy of the methods significantly reduces the energy required to detect replicas while providing faster replica detection than the existing solutions.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.