{"title":"无线传感器网络中复制攻击检测的熟练算法综述","authors":"R. Sathish, D. R. Kumar","doi":"10.1109/ICE-CCN.2013.6528465","DOIUrl":null,"url":null,"abstract":"Due to the operating nature of the sensor networks they are often unattended and the sensor nodes in the network are prone to different kinds of novel attacks. These networks are expected to find increasing deployment in coming years, as they enable reliable monitoring and analysis of unknown and untested environments. Enabling secure communication among the sensors is a major concern in WSN. In this paper we survey different efficient algorithms to detect the clone attacks in the Wireless Sensor Networks. We compare these algorithms considering various complexity metrics.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Proficient algorithms for replication attack detection in Wireless Sensor Networks — A survey\",\"authors\":\"R. Sathish, D. R. Kumar\",\"doi\":\"10.1109/ICE-CCN.2013.6528465\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the operating nature of the sensor networks they are often unattended and the sensor nodes in the network are prone to different kinds of novel attacks. These networks are expected to find increasing deployment in coming years, as they enable reliable monitoring and analysis of unknown and untested environments. Enabling secure communication among the sensors is a major concern in WSN. In this paper we survey different efficient algorithms to detect the clone attacks in the Wireless Sensor Networks. We compare these algorithms considering various complexity metrics.\",\"PeriodicalId\":286830,\"journal\":{\"name\":\"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)\",\"volume\":\"116 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-03-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICE-CCN.2013.6528465\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICE-CCN.2013.6528465","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proficient algorithms for replication attack detection in Wireless Sensor Networks — A survey
Due to the operating nature of the sensor networks they are often unattended and the sensor nodes in the network are prone to different kinds of novel attacks. These networks are expected to find increasing deployment in coming years, as they enable reliable monitoring and analysis of unknown and untested environments. Enabling secure communication among the sensors is a major concern in WSN. In this paper we survey different efficient algorithms to detect the clone attacks in the Wireless Sensor Networks. We compare these algorithms considering various complexity metrics.