Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/88818
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.contributorChinese Mainland Affairs Office-
dc.creatorChen, HL-
dc.creatorChen, WD-
dc.creatorWang, ZB-
dc.creatorWang, Z-
dc.creatorLi, YJ-
dc.date.accessioned2020-12-22T01:08:11Z-
dc.date.available2020-12-22T01:08:11Z-
dc.identifier.issn1550-1329-
dc.identifier.urihttp://hdl.handle.net/10397/88818-
dc.language.isoenen_US
dc.publisherSage Publications, Inc.en_US
dc.rightsCopyright © 2014 Honglong Chen et al.This is an open access article distributed under the Creative Commons Attribution License (https://creativecommons.org/licenses/by/3.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.en_US
dc.rightsThe following publication Chen, H. L., Chen, W. D., Wang, Z. B., Wang, Z., & Li, Y. J. (2014). Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks. International Journal of Distributed Sensor Networks, 910242, 1-10 is available at https://dx.doi.org/10.1155/2014/910242en_US
dc.titleMobile beacon based wormhole attackers detection and positioning in wireless sensor networksen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage1-
dc.identifier.epage10-
dc.identifier.doi10.1155/2014/910242-
dcterms.abstractWormhole attack is a severe attack that can be easily launched by a pair of external attackers in hostile wireless sensor networks. In the wormhole attack, an attacker sniffs packets at one point in the network, and tunnels them through the wormhole link to the other attacker at another point of the network, which broadcasts them to its neighbors. Such kind of procedure can easily deteriorate the normal functionality of the networks. In this paper, we propose a novel wormhole attackers detection and positioning scheme based on mobile beacon, which can not only detect the existence of wormhole attacks, but also accurately localize the attackers for the system to eliminate them out of the network. The main idea is to detect whether the communication between the mobile beacon and each of the static beacons violates the communication properties and then the attacker can be estimated as the center of its communication area by determining the intersection point of the chords perpendicular bisector. The simulation results illustrate that our proposed scheme can obtain a high wormhole attack detection probability as well as a high attackers positioning accuracy.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationInternational journal of distributed sensor networks, 2014, 910242, p. 1-10-
dcterms.isPartOfInternational journal of distributed sensor networks-
dcterms.issued2014-
dc.identifier.isiWOS:000334234300001-
dc.identifier.eissn1550-1477-
dc.identifier.artn910242-
dc.description.validate202012 bcrc-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_Scopus/WOSen_US
dc.description.pubStatusPublisheden_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Chen_Mobile_Beacon_Based.pdf1 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

55
Last Week
0
Last month
Citations as of May 19, 2024

Downloads

17
Citations as of May 19, 2024

SCOPUSTM   
Citations

15
Citations as of May 17, 2024

WEB OF SCIENCETM
Citations

7
Citations as of May 16, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.