Anda di halaman 1dari 1

ABSTRACT

WIRELESS sensor networks (WSNs) have been used in various applications, e.g.,
military, environmental, and health applications. When WSNs are deployed in hostile
scenarios, such as surveillance on the battlefield, they must confront the threats from
attackers the attackers may intend to learn information from the WSNs or disable the
functions of the WSNs. In clone attacks an adversary captures only a few of nodes,
replicates them and then deploys arbitrary number of replicas throughout the network.
The model is to detect byzantine Node attacks and prevent the false Nodes from attacking
networks in mobile wireless sensor networks. If we do not detect these replicas, the
network will be vulnerable to a large class of internal attacks. Existing approaches may
be deterministic, or cannot defend against smart attacks, or need a central control and
work only in static sensor networks and are not applicable for mobile sensor networks.
The adversary may protect his replicas by starting a special witness compromising attack,
the Smart attack. The detection protocols involving a central control have inherent limits
such as a single point of failure. This paper proposes a challenge and response strategy
which outperforms previous strategies because it uses localized detection, efficient,
effective, has network wide synchronization, and also revocation. It also naturally
distributes the responsibility of witness node selection to every passed node in the mobile
sensor network and then adversaries cannot easily find out the critical witness nodes. The
communication overheads of our protocols are lower and are affordable considering the
security benefits.

Anda mungkin juga menyukai