4.7 Review

Detecting node replication attacks in wireless sensor networks: A survey

期刊

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
卷 35, 期 3, 页码 1022-1034

出版社

ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
DOI: 10.1016/j.jnca.2012.01.002

关键词

Wireless sensor network; Security; Node replication attack; Detection

资金

  1. National Natural Science Foundation of China [60970138]

向作者/读者索取更多资源

A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-constrained sensor nodes, but is often deployed in unattended and harsh environments to perform various monitoring tasks. As a result, WSNs are susceptible to many application-dependent and application-independent attacks. In this paper we consider a typical threat in the latter category known as the node replication attack, where an adversary prepares her own low-cost sensor nodes and deceives the network into accepting them as legitimate ones. To do so, the adversary only needs to physically capture one node, extract its secret credentials, reproduce the node in large quantity, and then deploy the replicas under her control into the network, possibly at strategic positions, to cripple various WSN applications with little effort. Defending against such node replication attacks has recently become an imperative research topic in sensor network security, and the design issues may involve different and more threatening challenges than detecting typical application-dependent attacks. In this survey, we classify existent detections in the literature, and explore the various proposals in each category. We look into necessary technical details and make certain comparisons, so as to demonstrate their respective contributions as well as limitations. We also present the technical challenges and indicate some possible directions for future research. (C) 2012 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control

Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng

Summary: To reduce costs and improve collaboration in healthcare research and commercial activities, electronic medical records (EMRs) are proposed to shift to shareable electronic records. However, the trustworthiness of cloud service providers poses a challenge. In this paper, a secure and efficient EMR sharing system is proposed, featuring a novel cryptosystem and blockchain technology, which allows fine-grained sharing and detection of unauthorized manipulation.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Theory & Methods

Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds

Jianfei Sun, Guowen Xu, Tianwei Zhang, Xuehuan Yang, Mamoun Alazab, Robert H. Deng

Summary: The cloud-based data sharing technology with cryptographic primitives allows data owners to outsource data and share information privately with arbitrary recipients regardless of geographical barriers. However, existing efforts in outsourced data sharing are inefficient, inflexible, or insecure due to issues such as dynamic target ciphertext designation, identity hiding of recipients, and verification of outsourced ciphertext transformation. Motivated by this, we design VF-PPBA, the first Verifiable, Fair and Privacy-preserving Broadcast Authorization framework for flexible data sharing in clouds. Using a new primitive called privacy-preserving multi-recipient broadcast proxy re-encryption (PPMR-BPRE), we ensure efficient ciphertext transformation, identity protection, and verify the correctness of outsourced conversion tasks.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Theory & Methods

Accountable and Fine-Grained Controllable Rewriting in Blockchains

Shengmin Xu, Xinyi Huang, Jiaming Yuan, Yingjiu Li, Robert H. Deng

Summary: Most blockchains are immutable, which poses challenges for blockchain development due to storage abuse and legal obligations. To address this, Derler et al. proposed a redactable blockchain with fine-grained controllable rewriting using policy-based chameleon hash (PCH). However, their solution lacked accountability, allowing trapdoor holders to potentially abuse their privileges. In this paper, a design for a PCH with blackbox accountability (PCHA) is introduced, offering linkability and traceability to identify responsible trapdoor holders. The PCHA construction is proven to have rigorous security and is implemented with minimal overhead compared to existing solutions.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Hardware & Architecture

Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds

Hua Deng, Zheng Qin, Qianhong Wu, Robert H. Deng, Zhenyu Guan, Yupeng Hu, Fangmin Li

Summary: Cloud computing is popular for data storage and sharing. Encryption is important for data security, but can hinder data sharing. This article proposes a hierarchical data sharing scheme that allows the data owner to selectively share encrypted data with users in a hierarchy, providing control over access.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Automation & Control Systems

LiVoAuth: Liveness Detection in Voiceprint Authentication With Random Challenges and Detection Modes

Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng

Summary: Voiceprint authentication provides convenience but is vulnerable to spoofing attacks. Liveness detection is an effective way to resist these attacks, but current methods have drawbacks such as high costs and complexity. This article proposes a novel liveness detection method called LiVoAuth, which uses a randomly generated vector sequence as the liveness detection mode. User studies show that LiVoAuth outperforms cutting-edge methods in terms of accuracy, stability, efficiency, security, and user acceptance.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

CROWDFL: Privacy-Preserving Mobile Crowdsensing System Via Federated Learning

Bowen Zhao, Ximeng Liu, Wei-Neng Chen, Robert H. Deng

Summary: In this paper, a privacy-preserving mobile crowdsensing system called CROWDFL is proposed by integrating federated learning (FL) into MCS. Participants in CROWDFL locally process sensing data and only upload encrypted training models to the server to protect their privacy. The system also includes a secure aggregation algorithm and a hybrid incentive mechanism to improve efficiency and stimulate participation.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Theory & Methods

PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability

Yuxian Li, Jian Weng, Wei Wu, Ming Li, Yingjiu Li, Haoxin Tu, Yongdong Wu, Robert H. Deng

Summary: Blockchain systems are widely used in various scenarios, but traditional systems face scalability issues. Payment Channel Hubs (PCHs) are proposed to address this issue, with recent efforts enhancing privacy, reusability, and interoperability properties. However, current solutions have limitations such as reliance on trusted hardware or deposit lock-in problem. We propose a novel PCH solution called PRI that guarantees privacy, reusability, and interoperability while mitigating these problems.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2023)

Article Computer Science, Theory & Methods

CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics

Bowen Zhao, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Yingjiu Li, Robert H. Deng

Summary: This paper presents CROWD FA, a novel paradigm for privacy-preserving mobile crowdsensing (MCS) through federated analytics (FA), which achieves a well-rounded solution encompassing data aggregation, incentive design, and privacy protection. CROWD FA enables participants to perform aggregation operations on their local data, while preserving privacy through efficient cryptographic techniques. Experimental evaluations demonstrate that CROWD FA outperforms state-of-the-art approaches by achieving up to 22 times faster computation time.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Information Systems

Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing

Jianfei Sun, Guowen Xu, Tianwei Zhang, Hu Xiong, Hongwei Li, Robert H. Deng

Summary: Benefiting from the powerful computing and storage capabilities of cloud services, data sharing in the cloud has been widely used in various applications. However, concerns about data privacy breaches have arisen due to outsourcing data to untrusted cloud. To address this issue, this article proposes an Efficient, Scalable and Privacy-preserving Data sharing framework over encrypted cloud dataset (ESPD). Unlike previous works, ESPD supports sharing target data to multiple users with distinct secret keys and maintains a constant ciphertext length. Security analysis and real-world experiments demonstrate the desirable performance of ESPD compared to other similar schemes.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Information Systems

Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data

Feng Li, Jianfeng Ma, Yinbin Miao, Zhiquan Liu, Kim-Kwang Raymond Choo, Ximeng Liu, Robert H. Deng

Summary: Symmetric Searchable Encryption (SSE) schemes have been extensively explored for improved function, efficiency, and security. However, in real-world settings, additional functions such as forward and backward privacy and support for boolean search are needed. In this article, we propose the construction of Verifiable Boolean Search (VBS) over encrypted data and enhance it to achieve Forward and Backward privacy (VBS-FB). We also provide a formal proof of security and evaluate the performance using real-world datasets.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Information Systems

Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer

Yang Yang, Robert H. Deng, Wenzhong Guo, Hongju Cheng, Xiangyang Luo, Xianghan Zheng, Chunming Rong

Summary: In this article, a dual traceable distributed attribute based encryption system (DTDABE-SKS) is proposed to achieve secure provenance and traitor trace, as well as flexible subset keyword search. The system ensures privacy protection for data providers and users using non-interactive zero-knowledge proof technology, while allowing disclosure of real identities in certain circumstances. Additionally, a new concept of updatable and transferable message-lock encryption (UT-MLE) is introduced for block-level dynamic encrypted file updates and efficient ownership transfer.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Hardware & Architecture

Identifiable, But Not Visible: A Privacy-Preserving Person Reidentification Scheme

Bowen Zhao, Yingjiu Li, Ximeng Liu, Xiaoguo Li, Hwee Hwa Pang, Robert H. H. Deng

Summary: This article explores the first solution for building a privacy-preserving person Re-ID system, by formulating privacy-preserving person Re-ID as similarity metrics of encrypted feature vectors.

IEEE TRANSACTIONS ON RELIABILITY (2023)

Article Computer Science, Theory & Methods

Authenticable Data Analytics Over Encrypted Data in the Cloud

Lanxiang Chen, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng

Summary: In this paper, a novel approach is proposed to achieve privacy-preserving statistical analysis on an encrypted database. A privacy-preserving calculator is constructed to calculate attributes' count values for later statistical analysis, and an authenticable additive homomorphic encryption scheme is adopted to authenticate these encrypted count values. Furthermore, a cryptosystem based on binary vectors is proposed to achieve complex logic expressions for statistical analysis on encrypted data. Several protocols for statistical analysis, including conjunctive, disjunctive, and complex logic expressions, are designed with the aid of the proposed cryptographic calculator to achieve more complicated statistical functionalities. Experimental results show the feasibility and practicality of the proposed scheme.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Proceedings Paper Computer Science, Hardware & Architecture

Efficient and Secure Spatial Range Query over Large-scale Encrypted Data

Yinbin Miao, Chao Xu, Yifeng Zheng, Ximeng Liu, Xiangdong Meng, Robert H. Deng

Summary: Spatial range query is widely used in various applications due to the advancement of geo-positioning technology. To address the efficiency and security challenges in large-scale encrypted spatial data, a novel efficient Privacy-preserving Spatial Range Query (ePSRQ) scheme in dual-cloud architecture is proposed. The scheme utilizes a novel index structure, Geohash algorithm, Circular Shift and Coalesce Zero-Sum Garbled Bloom Filter (CSC-ZGBF), and Symmetric Homomorphic Encryption (SHE) to achieve computational complexity independent of dataset size. Formal security analysis demonstrates its robustness against chosen-plaintext attack, and extensive experiments confirm its feasibility in real-world applications.

2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS (2023)

Article Automation & Control Systems

Efficient Privacy-Preserving Federated Learning With Improved Compressed Sensing

Yifan Zhang, Yinbin Miao, Xinghua Li, Linfeng Wei, Zhiquan Liu, Kim-Kwang Raymond Choo, Robert H. Deng

Summary: Researchers propose a secure and communication-efficient federated learning scheme using improved compressed sensing and CKKS homomorphic encryption to solve the issue of data silos and privacy leakage in distributed machine learning.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Hardware & Architecture

A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems

Zihang Zhen, Xiaoding Wang, Hui Lin, Sahil Garg, Prabhat Kumar, M. Shamim Hossain

Summary: In this paper, a blockchain architecture based on dynamic state sharding (DSSBD) is proposed to solve the problems caused by cross-shard transactions and reconfiguration. By utilizing deep reinforcement learning, the number of shards, block spacing, and block size can be dynamically adjusted to improve the performance of the blockchain. The experimental results show that the crowdsourcing system with DSSBD has better performance in terms of throughput, latency, balancing, cross-shard transaction proportion, and node reconfiguration proportion, while ensuring security.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

A flexible algorithm to offload DAG applications for edge computing

Gabriel F. C. de Queiroz, Jose F. de Rezende, Valmir C. Barbosa

Summary: Multi-access Edge Computing (MEC) is a technology that enables faster task processing at the network edge by deploying servers closer to end users. This paper proposes the FlexDO algorithm to solve the DAG application partitioning and offloading problem, and compares it with other solutions to demonstrate its superior performance in various test scenarios.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm

Shahid Latif, Wadii Boulila, Anis Koubaa, Zhuo Zou, Jawad Ahmad

Summary: In the field of Industrial Internet of Things (IIoT), networks are increasingly vulnerable to cyberattacks. This research introduces an optimized Intrusion Detection System based on Deep Transfer Learning (DTL) for heterogeneous IIoT networks, combining Convolutional Neural Networks (CNNs), Genetic Algorithms (GA), and ensemble techniques. Through rigorous evaluation, the framework achieves exceptional performance and accurate detection of various cyberattacks.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

STOP: Joint send buffer and transmission control for user-perceived deadline guarantee via curriculum guided-deep reinforcement learning

Rongji Liao, Yuan Zhang, Jinyao Yan, Yang Cai, Narisu Tao

Summary: This paper proposes a joint control approach called STOP to guarantee user-perceived deadline using curriculum-guided deep reinforcement learning. Experimental results show that the STOP scheme achieves a significantly higher average arrival ratio in NS-3.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

End-to-end active queue management with Named-Data Networking

Miguel Rodriguez-Perez, Sergio Herreria-Alonso, J. Carlos Lopez-Ardao, Raul F. Rodriguez-Rubio

Summary: This paper presents an implementation of an active queue management (AQM) algorithm for the Named-Data Networking (NDN) architecture and its application in congestion control protocols. By utilizing the congestion mark field in NDN packets, information about each transmission queue is encoded to achieve a scalable AQM solution.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

HADES: An NFV solution for energy-efficient placement and resource allocation in infrastructures

Angel Canete, Mercedes Amor, Lidia Fuentes

Summary: This paper proposes an energy-aware placement of service function chains of Virtual Network Functions (VNFs) and a resource-allocation solution for heterogeneous edge infrastructures. The solution has been integrated with an open source management and orchestration project and has been successfully applied to augmented reality services, achieving significant reduction in power consumption and ensuring quality of service compliance.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Node cardinality estimation in a heterogeneous wireless network deployed over a large region using a mobile base station

Sachin Kadam, Kaustubh S. Bhargao, Gaurav S. Kasbekar

Summary: This paper discusses the problem of estimating the node cardinality of each node type in a heterogeneous wireless network. Two schemes, HSRC-M1 and HSRC-M2, are proposed to rapidly estimate the number of nodes of each type. The accuracy and efficiency of these schemes are proven through mathematical analysis and simulation experiments.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

A hybrid analytical concept to QoE index evaluation: Enhancing eMBB service detection in 5G SA networks

Jean Nestor M. Dahj, Kingsley A. Ogudo, Leandro Boonzaaier

Summary: The launch of commercial 5G networks has opened up opportunities for heavy data users and highspeed applications, but traditional monitoring and evaluation techniques have limitations in the 5G networks. This paper presents a cost-effective hybrid analytical approach for detecting and evaluating user experience in real-time 5G networks, using statistical methods to calculate the user quality index.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Dynamic resource management in integrated NOMA terrestrial-satellite networks using multi-agent reinforcement learning

Ali Nauman, Haya Mesfer Alshahrani, Nadhem Nemri, Kamal M. Othman, Nojood O. Aljehane, Mashael Maashi, Ashit Kumar Dutta, Mohammed Assiri, Wali Ullah Khan

Summary: The integration of terrestrial and satellite wireless communication networks offers a practical solution to enhance network coverage, connectivity, and cost-effectiveness. This study introduces a resource allocation framework that leverages local cache pool deployments and non-orthogonal multiple access (NOMA) to improve energy efficiency. Through the use of a multi-agent enabled deep deterministic policy gradient algorithm (MADDPG), the proposed approach optimizes user association, cache design, and transmission power control, resulting in enhanced energy efficiency and reduced time delays compared to existing methods.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

A fast coordination approach for large-scale drone swarm

Wu Chen, Jiayi Zhu, Jiajia Liu, Hongzhi Guo

Summary: With advancements in technology, large-scale drone swarms will be widely used in commercial and military fields. Current application methods are mainly divided into autonomous methods and controlled methods. This paper proposes a new framework for global coordination through local interaction.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

CE-VNE: Constraint escalation virtual network embedding algorithm assisted by graph convolutional networks

Peiying Zhang, Zhihu Luo, Neeraj Kumar, Mohsen Guizani, Hongxia Zhang, Jian Wang

Summary: With the development of Industry 5.0, the demand for network access devices is increasing, especially in areas such as financial transactions, drone control, and telemedicine where low latency is crucial. However, traditional network architectures limit the construction of low-latency networks due to the tight coupling of control and data forwarding functions. To overcome this problem, researchers propose a constraint escalation virtual network embedding algorithm assisted by Graph Convolutional Networks (GCN), which automatically extracts network features and accelerates the learning process to improve network performance.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Review Computer Science, Hardware & Architecture

Comprehensive review on congestion detection, alleviation, and control for IoT networks

P. Anitha, H. S. Vimala, J. Shreyas

Summary: Congestion control is crucial for maintaining network stability, reliability, and performance in IoT. It ensures that critical applications can operate seamlessly and that IoT devices can communicate efficiently without overwhelming the network. Congestion control algorithms ensure that the network operates within its capacity, preventing network overload and maintaining network performance.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Enabling containerized Central Unit live migration in 5G radio access network: An experimental study

Shunmugapriya Ramanathan, Abhishek Bhattacharyya, Koteswararao Kondepu, Andrea Fumagalli

Summary: This article presents an experiment that achieves live migration of a containerized 5G Central Unit module using modified open-source migration software. By comparing different migration techniques, it is found that the hybrid migration technique can reduce end-user service recovery time by 36% compared to the traditional cold migration technique.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

Fatma Foad Ashrif, Elankovan A. Sundararajan, Rami Ahmad, Mohammad Kamrul Hasan, Elaheh Yadegaridehkordi

Summary: This article introduces the development and current status of authentication protocols in 6LoWPAN, and proposes an innovative perspective to fill the research gap. The article comprehensively surveys and evaluates AKA protocols, analyzing their suitability in wireless sensor networks and the Internet of Things, and proposes future research directions and issues.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)

Article Computer Science, Hardware & Architecture

Task offloading to edge cloud balancing utility and cost for energy harvesting Internet of Things

Pranjal Kumar Nandi, Md. Rejaul Islam Reaj, Sujan Sarker, Md. Abdur Razzaque, Md. Mamun-or-Rashid, Palash Roy

Summary: This paper proposes a task offloading policy for IoT devices to a mobile edge computing system, aiming to balance device utility and execution cost. A meta heuristic approach is developed to solve the offloading problem, and the results show its potential in terms of task execution latency, energy consumption, utility per unit cost, and task drop rate.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2024)