{"title":"保护无线传感器网络免受节点复制攻击的MCD协议","authors":"Khedim Farah, Labraoui Nabila","doi":"10.1109/INDS.2014.18","DOIUrl":null,"url":null,"abstract":"Often deployed in hostile environments, sensor networks have become an easy target for a variety of attacks such as: intrusion, Denial of service, eavesdropping. While most of these threats can be prevented using cryptographic materials, the node replication attack, also called \"clone attack\" remains undetectable, this is why it is considered one of the most insidious attacks not only because it goes unnoticed but it is also the entry point of internal attacks that can have disastrous consequences on the network. Several studies have focused on methods to detect the clone attacks and various protocols have resulted, but the absence of an \"ideal solution\" fact that various publications spend again. In this paper, we present a new protocol: Mobile assisted Clone Detection scheme (MCD) which is a hybrid protocol effective and efficient resistant against two realistic adversary models: the vanishing and the persistent adversary and providing high detection rate, while incurring limited overhead.","PeriodicalId":388358,"journal":{"name":"2014 International Conference on Advanced Networking Distributed Systems and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"The MCD Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks\",\"authors\":\"Khedim Farah, Labraoui Nabila\",\"doi\":\"10.1109/INDS.2014.18\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Often deployed in hostile environments, sensor networks have become an easy target for a variety of attacks such as: intrusion, Denial of service, eavesdropping. While most of these threats can be prevented using cryptographic materials, the node replication attack, also called \\\"clone attack\\\" remains undetectable, this is why it is considered one of the most insidious attacks not only because it goes unnoticed but it is also the entry point of internal attacks that can have disastrous consequences on the network. Several studies have focused on methods to detect the clone attacks and various protocols have resulted, but the absence of an \\\"ideal solution\\\" fact that various publications spend again. In this paper, we present a new protocol: Mobile assisted Clone Detection scheme (MCD) which is a hybrid protocol effective and efficient resistant against two realistic adversary models: the vanishing and the persistent adversary and providing high detection rate, while incurring limited overhead.\",\"PeriodicalId\":388358,\"journal\":{\"name\":\"2014 International Conference on Advanced Networking Distributed Systems and Applications\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Advanced Networking Distributed Systems and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDS.2014.18\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advanced Networking Distributed Systems and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDS.2014.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The MCD Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
Often deployed in hostile environments, sensor networks have become an easy target for a variety of attacks such as: intrusion, Denial of service, eavesdropping. While most of these threats can be prevented using cryptographic materials, the node replication attack, also called "clone attack" remains undetectable, this is why it is considered one of the most insidious attacks not only because it goes unnoticed but it is also the entry point of internal attacks that can have disastrous consequences on the network. Several studies have focused on methods to detect the clone attacks and various protocols have resulted, but the absence of an "ideal solution" fact that various publications spend again. In this paper, we present a new protocol: Mobile assisted Clone Detection scheme (MCD) which is a hybrid protocol effective and efficient resistant against two realistic adversary models: the vanishing and the persistent adversary and providing high detection rate, while incurring limited overhead.