Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/88818
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | - |
dc.contributor | Chinese Mainland Affairs Office | - |
dc.creator | Chen, HL | - |
dc.creator | Chen, WD | - |
dc.creator | Wang, ZB | - |
dc.creator | Wang, Z | - |
dc.creator | Li, YJ | - |
dc.date.accessioned | 2020-12-22T01:08:11Z | - |
dc.date.available | 2020-12-22T01:08:11Z | - |
dc.identifier.issn | 1550-1329 | - |
dc.identifier.uri | http://hdl.handle.net/10397/88818 | - |
dc.language.iso | en | en_US |
dc.publisher | Sage Publications, Inc. | en_US |
dc.rights | Copyright © 2014 Honglong Chen et al.This is an open access article distributed under the Creative Commons Attribution License (https://creativecommons.org/licenses/by/3.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. | en_US |
dc.rights | The following publication Chen, H. L., Chen, W. D., Wang, Z. B., Wang, Z., & Li, Y. J. (2014). Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks. International Journal of Distributed Sensor Networks, 910242, 1-10 is available at https://dx.doi.org/10.1155/2014/910242 | en_US |
dc.title | Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks | en_US |
dc.type | Journal/Magazine Article | en_US |
dc.identifier.spage | 1 | - |
dc.identifier.epage | 10 | - |
dc.identifier.doi | 10.1155/2014/910242 | - |
dcterms.abstract | Wormhole attack is a severe attack that can be easily launched by a pair of external attackers in hostile wireless sensor networks. In the wormhole attack, an attacker sniffs packets at one point in the network, and tunnels them through the wormhole link to the other attacker at another point of the network, which broadcasts them to its neighbors. Such kind of procedure can easily deteriorate the normal functionality of the networks. In this paper, we propose a novel wormhole attackers detection and positioning scheme based on mobile beacon, which can not only detect the existence of wormhole attacks, but also accurately localize the attackers for the system to eliminate them out of the network. The main idea is to detect whether the communication between the mobile beacon and each of the static beacons violates the communication properties and then the attacker can be estimated as the center of its communication area by determining the intersection point of the chords perpendicular bisector. The simulation results illustrate that our proposed scheme can obtain a high wormhole attack detection probability as well as a high attackers positioning accuracy. | - |
dcterms.accessRights | open access | en_US |
dcterms.bibliographicCitation | International journal of distributed sensor networks, 2014, 910242, p. 1-10 | - |
dcterms.isPartOf | International journal of distributed sensor networks | - |
dcterms.issued | 2014 | - |
dc.identifier.isi | WOS:000334234300001 | - |
dc.identifier.eissn | 1550-1477 | - |
dc.identifier.artn | 910242 | - |
dc.description.validate | 202012 bcrc | - |
dc.description.oa | Version of Record | en_US |
dc.identifier.FolderNumber | OA_Scopus/WOS | en_US |
dc.description.pubStatus | Published | en_US |
Appears in Collections: | Journal/Magazine Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Chen_Mobile_Beacon_Based.pdf | 1 MB | Adobe PDF | View/Open |
Page views
55
Last Week
0
0
Last month
Citations as of May 19, 2024
Downloads
17
Citations as of May 19, 2024
SCOPUSTM
Citations
15
Citations as of May 17, 2024
WEB OF SCIENCETM
Citations
7
Citations as of May 16, 2024
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.