Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cho, Kwantae | - |
dc.contributor.author | Lee, Byung-Gil | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-05T05:31:47Z | - |
dc.date.available | 2021-09-05T05:31:47Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2014-09 | - |
dc.identifier.issn | 1545-5971 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/97455 | - |
dc.description.abstract | The forthcoming internet of things-an intelligent collaboration of resource-limited devices such as wireless sensor nodes that are embedded in the daily lives of users-poses new challenges to security and end-user privacy. One of the most challenging problems is the thwarting of replica attacks. Once a sensor node is physically captured, it can be reprogrammed and replicated into a large number of replicas, which may maliciously occupy the network. Thus far, various schemes have been proposed to detect replicas; however, most of them require expensive hardware such as a global positioning system. In general, the ideal price for a sensor node is as low as one dollar, and thus, it is equipped with limited resources; hence, it is not practical to employ additional devices. In this paper, we propose a low-priced and efficient solution for replica detection in static wireless sensor networks. Although the proposed solution does not need any additional hardware, it exhibits similar or better performance, as compared to existing schemes. Through simulation experiments, we show that the proposed solution provides comparable performance in terms of the replica detection ratio and the time required to detect replicas. Furthermore, we show that the proposed solution saves more energy than existing schemes in most of our simulations. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.subject | DISTRIBUTED DETECTION | - |
dc.subject | CLONE ATTACKS | - |
dc.subject | NODE ATTACKS | - |
dc.title | Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1109/TDSC.2013.41 | - |
dc.identifier.scopusid | 2-s2.0-84959326553 | - |
dc.identifier.wosid | 000342086300005 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.11, no.5, pp.454 - 466 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
dc.citation.title | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
dc.citation.volume | 11 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 454 | - |
dc.citation.endPage | 466 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | DISTRIBUTED DETECTION | - |
dc.subject.keywordPlus | CLONE ATTACKS | - |
dc.subject.keywordPlus | NODE ATTACKS | - |
dc.subject.keywordAuthor | Security and protection | - |
dc.subject.keywordAuthor | authentication | - |
dc.subject.keywordAuthor | network protocols | - |
dc.subject.keywordAuthor | ubiquitous computing | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.