An Impersonation Attack Detection Method Using Bloom Filters and Dispersed Data Transmission for Wireless Sensor Networks
Wireless Sensor Networks consist of sensor nodes with wireless communication devices and sink nodes (here-inafter referred to as destination nodes). Intermediate nodes relay the source nodes' data packets to destination nodes. When an intermediate node steals a source node's ID within rela...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Wireless Sensor Networks consist of sensor nodes with wireless communication devices and sink nodes (here-inafter referred to as destination nodes). Intermediate nodes relay the source nodes' data packets to destination nodes. When an intermediate node steals a source node's ID within relayed data packets, it can impersonate the source node. In this paper, we have proposed a new detection method against such impersonation attacks using Bloom Filters and a Secret-Sharing-Scheme-based Dispersed Data Transfer method. In addition, we simulated this scheme to confirm its effectiveness. |
---|---|
DOI: | 10.1109/GreenCom.2012.126 |