Authors
Alekha Kumar Mishra, Ashok Kumar Turuk
Publication date
2011/2/24
Conference
2011 international conference on devices and communications (ICDeCom)
Pages
1-5
Publisher
IEEE
Description
Node capture attack is considered to be one of the most serious attack in WSN. An adversary physically captures a node so that she can steal all the confidential information stored in it and can launch further attacks by deploying clones of a captured node. To achieve this she needs to gather useful information regarding the network before capturing a node. Hence, a node capture by an adversary depends on how quickly she is able to gather the information regarding the network and about the target node. In this paper we have proposed a model for the process of gathering information by an adversary. We have also found the expected amount of information an adversary have at an arbitrary time t. Using the above information we proposed the expected time of a node capture based on the strength of an adversary and the dynamicity of the network.
Total citations
20122013201420152016201720182019202020212022202314134431212
Scholar articles