{"title":"The MCD Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks","authors":"Khedim Farah, Labraoui Nabila","doi":"10.1109/INDS.2014.18","DOIUrl":null,"url":null,"abstract":"Often deployed in hostile environments, sensor networks have become an easy target for a variety of attacks such as: intrusion, Denial of service, eavesdropping. While most of these threats can be prevented using cryptographic materials, the node replication attack, also called \"clone attack\" remains undetectable, this is why it is considered one of the most insidious attacks not only because it goes unnoticed but it is also the entry point of internal attacks that can have disastrous consequences on the network. Several studies have focused on methods to detect the clone attacks and various protocols have resulted, but the absence of an \"ideal solution\" fact that various publications spend again. In this paper, we present a new protocol: Mobile assisted Clone Detection scheme (MCD) which is a hybrid protocol effective and efficient resistant against two realistic adversary models: the vanishing and the persistent adversary and providing high detection rate, while incurring limited overhead.","PeriodicalId":388358,"journal":{"name":"2014 International Conference on Advanced Networking Distributed Systems and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advanced Networking Distributed Systems and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDS.2014.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Often deployed in hostile environments, sensor networks have become an easy target for a variety of attacks such as: intrusion, Denial of service, eavesdropping. While most of these threats can be prevented using cryptographic materials, the node replication attack, also called "clone attack" remains undetectable, this is why it is considered one of the most insidious attacks not only because it goes unnoticed but it is also the entry point of internal attacks that can have disastrous consequences on the network. Several studies have focused on methods to detect the clone attacks and various protocols have resulted, but the absence of an "ideal solution" fact that various publications spend again. In this paper, we present a new protocol: Mobile assisted Clone Detection scheme (MCD) which is a hybrid protocol effective and efficient resistant against two realistic adversary models: the vanishing and the persistent adversary and providing high detection rate, while incurring limited overhead.