An Impersonation Attack Detection Method Using Bloom Filters and Dispersed Data Transmission for Wireless Sensor Networks

Wireless Sensor Networks consist of sensor nodes with wireless communication devices and sink nodes (here-inafter referred to as destination nodes). Intermediate nodes relay the source nodes' data packets to destination nodes. When an intermediate node steals a source node's ID within rela...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Tanabe, N., Kohno, E., Kakuda, Y.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Wireless Sensor Networks consist of sensor nodes with wireless communication devices and sink nodes (here-inafter referred to as destination nodes). Intermediate nodes relay the source nodes' data packets to destination nodes. When an intermediate node steals a source node's ID within relayed data packets, it can impersonate the source node. In this paper, we have proposed a new detection method against such impersonation attacks using Bloom Filters and a Secret-Sharing-Scheme-based Dispersed Data Transfer method. In addition, we simulated this scheme to confirm its effectiveness.
DOI:10.1109/GreenCom.2012.126