Random Key Pre-Distribution Techniques against Sybil Attacks

Publish Year: 1395
نوع سند: مقاله ژورنالی
زبان: English
View: 330

This Paper With 13 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JCESH-5-1_001

تاریخ نمایه سازی: 22 مهر 1398

Abstract:

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obtained by captured benign nodes. Existing Sybil defensive mechanisms suffer from the restricted sensor network size, or cause excessive resource consumption for the sensor network. In this work we propose a Sybil node detection mechanism, based on Random Key Distribution (RKD) schemes that can cope with large network sizes and minimize the waste of resources. We explain the techniques each node can use in a network running q-composite RKD to detect Sybil identities and restrict their number. Our method requires no trust to other sensors, which is important to defend against the attack.

Authors

Mohammad Ehdaie

Parsa Sharif Research Center

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • J. R. Douceur, The Sybil attack, in Revised Papers from ...
  • Q. Wang, Y. Zhu, and L. Cheng, Reprogramming wireless sensor ...
  • H. Chan, A. Perrig, and D. Song, Random key predistribution ...
  • L. Eschenauer and V. D. Gligor, A key-management scheme for ...
  • W. Du, J. Deng, Y. S. Han, and P. K. ...
  • D. Liu and P. Ning, Establishing pairwise keys in distributed ...
  • J. Newsome, E. Shi, D. Song, and A. Perrig, The ...
  • P. Papadimitratos and J. Deng, Stealthy pre-attacks against random key ...
  • M. Poturalski, P. Papadimitratos, and J.P. Hubaux, Secure Neighbor Discovery ...
  • M. Poturalski, P. Papadimitratos and J.P. Hubaux, Towards provable secure ...
  • Y. Zhang, W. Liu, Y. Fang, and D. Wu, Secure ...
  • D. Liu, P. Ning, and W. Du, Detecting malicious beacon ...
  • R. John, J.P. Cherian, and J.J. Kizhakkethottam, A survey of ...
  • R. Gunturu, Survey of Sybil Attacks in Social Networks,  arXiv ...
  • M.M.M. Fouad, and A.E. Hassanien, Key Pre-distribution Techniques for WSN ...
  • T.W. Moore, Cooperative attack and defense in distributed networks, Doctoral ...
  • N. Balachandran, and S. Sanyal, A Review of Techniques to ...
  • C. Cheng, Y. Qian, and D. Zhang,   An Approach ...
  • J. Newsome, E. Shi, D. Song, and A. Perrig, The ...
  • B. N. Levine, C. Shields, and N. B. Margolin, A ...
  • L. Washbourne. A Survey of P2P Network Security, arXiv:1504.01358, 2015. ...
  • W. Chang and J. Wu, A Survey of Sybil Attacks ...
  • Zhao, H., Li, Y., Shen, J., Zhang, M., Zheng, R., ...
  • G.V.  Rakesh, S. Rangaswamy, V. Hegde, G. Shoba, A Survey ...
  • B. Awerbuch and C. Scheideler. Group Spreading, A Protocol for ...
  • P. Maniatis, D. S. H. Rosenthal, M. Roussopoulos, M. Baker, ...
  • P. Maniatis, M. Roussopoulos, T. J. Giuli, D. S. H. ...
  • A. Tangpong, G. Kesidis, Hung-yuan Hsu,  A. Hurson, Robust Sybil ...
  • M. Demirbas, Y. Song, An RSSI-based Scheme for Sybil Attack ...
  • نمایش کامل مراجع