首页    期刊浏览 2024年09月16日 星期一
登录注册

文章基本信息

  • 标题:Clone Detection in Sensor Networks with <i>Ad Hoc</i> and Grid Topologies
  • 本地全文:下载
  • 作者:R. R. Brooks ; P. Y. Govindaraju ; M. Pirretti
  • 期刊名称:International Journal of Distributed Sensor Networks
  • 印刷版ISSN:1550-1329
  • 电子版ISSN:1550-1477
  • 出版年度:2009
  • 卷号:5
  • DOI:10.1080/15501320701863460
  • 出版社:Hindawi Publishing Corporation
  • 摘要:In cloning attacks, an adversary captures a sensor node, reprograms it, makes multiple copies, and inserts these copies, into the network. Cloned nodes subvert sensor network processing from within. In a companion paper [2], we show how to detect and remove clones from sensor networks using random key predistribution security measures. Keys that are present on the cloned nodes are detected by using authentication statistics based on key usage frequency. For consistency with existing random key predistribution literature, and ease of explanation, the network in that paper used an Erdos-Renyi topology. In the Erdos-Renyi topology, the probability of connection between any two nodes in the network is uniform. Since the communications ranges of sensor nodes are limited, this topology is flawed. This article applies the clone detection approach from [2] to more realistic network topologies. Grid and ad hoc topologies reflect the node connectivity patterns of networks of nodes with range limits. We provide analytical methods for choosing detection thresholds that accurately detect clones. We use simulations to verify our method. In particular we find the limitations of this approach, such as the number of nodes that can be inserted without being detected.
国家哲学社会科学文献中心版权所有