An increasing body of protocols has been proposed in recent years for detecting node replication attack in sensor networks. Most of them however expose the following limitations: high performance overheads, unreasonable assumptions, etc. To address these issues, we propose two new protocols in this paper: LANCE and SACRED. LANCE is designed to be light-weight in performance at the cost of slightly weaker security robustness while SACRED obtains much greater security by trading off small performance. Theoretical analysis and simulations have also been conducted to evaluate the protocols in terms of security features and performance overheads
Abstract—In this paper, we study the challenging problem of node replication detection. Although def...
Wireless Sensor Networks (WSN) are often deployed in hostile environments, where an attacker can als...
International audienceWireless sensor networks (WSNs) are composed of a large number of low-cost, lo...
Sensor networks allow to deploy large self-organized and adaptable sets of sensors for many applicat...
Wireless sensor networks are often deployed in hostile environments, where anadversary can physicall...
Wireless sensor networks are often deployed in hostile environments, where an adversary can physical...
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can ph...
Wireless sensor nodes lack hardware support for tamper-resistance and are often deployed in unattend...
[[abstract]]Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-co...
Recent innovations in the field of technology led to the use of wireless sensor networks in variou...
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained se...
Abstract—By launching the node replication attack, the ad-versary can place the replicas of captured...
Wireless Sensor Network (WSN) is a collection of autonomous sensor nodes which are low cost hardware...
Abstract — Node replication detection is a challenging problem. Though the defending against node re...
Wireless sensor networks (WSNs) are composed of numerous low-cost, low-power sensor nodes communicat...
Abstract—In this paper, we study the challenging problem of node replication detection. Although def...
Wireless Sensor Networks (WSN) are often deployed in hostile environments, where an attacker can als...
International audienceWireless sensor networks (WSNs) are composed of a large number of low-cost, lo...
Sensor networks allow to deploy large self-organized and adaptable sets of sensors for many applicat...
Wireless sensor networks are often deployed in hostile environments, where anadversary can physicall...
Wireless sensor networks are often deployed in hostile environments, where an adversary can physical...
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can ph...
Wireless sensor nodes lack hardware support for tamper-resistance and are often deployed in unattend...
[[abstract]]Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-co...
Recent innovations in the field of technology led to the use of wireless sensor networks in variou...
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained se...
Abstract—By launching the node replication attack, the ad-versary can place the replicas of captured...
Wireless Sensor Network (WSN) is a collection of autonomous sensor nodes which are low cost hardware...
Abstract — Node replication detection is a challenging problem. Though the defending against node re...
Wireless sensor networks (WSNs) are composed of numerous low-cost, low-power sensor nodes communicat...
Abstract—In this paper, we study the challenging problem of node replication detection. Although def...
Wireless Sensor Networks (WSN) are often deployed in hostile environments, where an attacker can als...
International audienceWireless sensor networks (WSNs) are composed of a large number of low-cost, lo...