Low-priced and efficient replica detection framework for wireless sensor networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cho, Kwantae | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-05T02:46:49Z | - |
dc.date.available | 2021-09-05T02:46:49Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2014-12 | - |
dc.identifier.issn | 1936-6442 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/96718 | - |
dc.description.abstract | A replica attack is one of the most challenging problems in wireless sensor networks. Once a node is physically captured, it can be reprogrammed and replicated into a large number of replicas, and thus maliciously occupying the network. Although until now various schemes have been proposed to detect replicas, most of them suffer from high energy costs and additional device such as a global positioning system. In this paper, we introduce the efficient replica detection framework without the need of additional device. The framework consists of key establishment and replica detection protocols. The proposed replica detection protocol is executed on the proposed key establishment protocol. Furthermore, through simulation experiments, we show that the proposed replica detection protocol provides high replica detection ratio, faster replica detection, and higher energy saving than existing protocols. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | DISTRIBUTED DETECTION | - |
dc.subject | CLONE ATTACKS | - |
dc.title | Low-priced and efficient replica detection framework for wireless sensor networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1007/s12083-012-0180-4 | - |
dc.identifier.scopusid | 2-s2.0-84905120359 | - |
dc.identifier.wosid | 000339877700035 | - |
dc.identifier.bibliographicCitation | PEER-TO-PEER NETWORKING AND APPLICATIONS, v.7, no.4, pp.743 - 749 | - |
dc.relation.isPartOf | PEER-TO-PEER NETWORKING AND APPLICATIONS | - |
dc.citation.title | PEER-TO-PEER NETWORKING AND APPLICATIONS | - |
dc.citation.volume | 7 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 743 | - |
dc.citation.endPage | 749 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | DISTRIBUTED DETECTION | - |
dc.subject.keywordPlus | CLONE ATTACKS | - |
dc.subject.keywordAuthor | Replica detection | - |
dc.subject.keywordAuthor | Wireless sensor network | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.