Construction of WSN Based on Polynomial Node Capture Attack and Defense Methods
Hong Gan, Dan Pan
Available Online November 2012.
- https://doi.org/10.2991/citcs.2012.63How to use a DOI?
- WSN; symmetric polynomials; node capture attack; defense
- Wireless sensor network ( WSN ) in the presence of node capture attack, put forward a kind of node capture attack detection method of defense, the method based on polynomial in two variables will be node key information and node deployment time and identification for binding, when negotiating session keys between nodes, nodes need to validate each other deployment time and the current time the difference, and combined with the base station a verification node legitimacy. Programmed in stop an attacker captured using node eavesdropping network communication at the same time, to prevent capture nodes and legitimate node establishes a session key, effectively preventing the capture of nodes to join the network. Through the analysis that the scheme of the safety and low system cost.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Hong Gan AU - Dan Pan PY - 2012/11 DA - 2012/11 TI - Construction of WSN Based on Polynomial Node Capture Attack and Defense Methods BT - 2012 National Conference on Information Technology and Computer Science PB - Atlantis Press SP - 238 EP - 241 SN - 1951-6851 UR - https://doi.org/10.2991/citcs.2012.63 DO - https://doi.org/10.2991/citcs.2012.63 ID - Gan2012/11 ER -