Publication:
Detection of Node Capture Attack in Wireless Sensor Networks

dc.contributor.affiliationDA-IICT, Gandhinagar
dc.contributor.authorAgrawal, Sarita
dc.contributor.authorLopez, Javier
dc.contributor.authorDas, Maniklal
dc.contributor.researcherAgrawal, Sarita (201121013)
dc.date.accessioned2025-08-01T13:09:06Z
dc.date.issued01-03-2019
dc.description.abstractWireless sensor networks (WSNs) deployed in hostile environments for applications such as battle-field surveillance are vulnerable to various attacks, including node capture attack wherein an adversary physically captures, reprograms, and redeploys a node in the network. In this paper, we present a novel approach of program integrity verification (PIV) protocol to detect whether a node is captured. The cluster head equipped with trusted platform module (TPM) verifies by comparing the program memory content of the sensor node before and after capture. The proposed TPM-enabled PIV (TPIV) protocol uses dynamically computed hash-based key and pseudorandom function for detection of a captured node in the network. The security analysis of the TPIV protocol reveals that the probability of a node capture attack victim eluding the PIV and leaking the secret of any noncaptured node is negligible. The proposed TPIV protocol can detect the captured node even in the presence of a strong adversary capable of putting additional memory to elude the PIV. With the results of analytical and experimental comparisons, we show the performance improvement of TPIV protocol in terms of low communication, computation, and storage overhead as compared to the related protocols for PIV in WSN.
dc.format.extent238-247
dc.identifier.citationSarita Agrawal, Das, Manik Lal, and Javier Lopez, "Detection of Node Capture Attack in Wireless Sensor Networks," IEEE Systems Journal, vol. 13, no. 1, Mar. 2019, pp. 238-247, IEEE, 22 Aug. 2018. Doi: 10.1109/JSYST.2018.2863229
dc.identifier.doi10.1109/JSYST.2018.2863229
dc.identifier.issn1937-9234
dc.identifier.scopus2-s2.0-85052689699
dc.identifier.urihttps://ir.daiict.ac.in/handle/dau.ir/1631
dc.identifier.wosWOS:000459697700023
dc.language.isoen
dc.publisherIEEE
dc.relation.ispartofseriesVol. 13; No. 1
dc.source IEEE Systems Journal
dc.source.urihttps://ieeexplore.ieee.org/document/8444374
dc.titleDetection of Node Capture Attack in Wireless Sensor Networks
dspace.entity.typePublication
relation.isAuthorOfPublicationb5cc5527-f42b-4c08-bdc3-50c4d46603a0
relation.isAuthorOfPublication.latestForDiscoveryb5cc5527-f42b-4c08-bdc3-50c4d46603a0

Files

Collections