Detecting Compromised Sensor Nodes with Group Verification
- DOI
- 10.2991/amcce-17.2017.32How to use a DOI?
- Keywords
- Sensor network, Group verification, secret sharing.
- Abstract
To detect compromised sensor node, current solutions fail to resist the collusion attack. To address it, in this paper, we propose a novel solution called group verification. The key idea of group verification is that neighbor nodes and sink node cooperate to detect the compromised node. If one sink node want to check one suspicious node, every neighbor node contribute to pose a question for the suspicious node with secret sharing scheme, and sink node introduces its random number into the question. Thus one compromised neighbor node fail to disturb the question distribution. To expose illegal question, every question is accompanying with one checking token which is generated with one private checking key. The suspicious node recovers the question by collecting enough shares. After that, the suspicious node floods the answer, and its neighbor nodes all verify the answer with the help of sink node. Our discussion shows our solution is capable of detecting the collusion attack.
- Copyright
- © 2017, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - JinHui Yuan AU - Hongwei Zhou PY - 2017/03 DA - 2017/03 TI - Detecting Compromised Sensor Nodes with Group Verification BT - Proceedings of the 2017 2nd International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2017) PB - Atlantis Press SP - 187 EP - 191 SN - 2352-5401 UR - https://doi.org/10.2991/amcce-17.2017.32 DO - 10.2991/amcce-17.2017.32 ID - Yuan2017/03 ER -