Results 1 - 10
of
1,542
Compromised nodes in wireless sensor network 1
"... Abstract. Sensor webs consisting of nodes with limited battery power and wireless communication are deployed to collect useful information from a variety of environments. A new challenge in the wireless sensor networks (WSN) is the compromised nodes problem. Compromised nodes may exhibit arbitrary b ..."
Abstract
- Add to MetaCart
Abstract. Sensor webs consisting of nodes with limited battery power and wireless communication are deployed to collect useful information from a variety of environments. A new challenge in the wireless sensor networks (WSN) is the compromised nodes problem. Compromised nodes may exhibit arbitrary
A Framework for Identifying Compromised Nodes in Sensor Networks
"... Sensor networks are often subject to physical attacks. Once a node’s cryptographic key is compromised, an attacker may completely impersonate it, and introduce arbitrary false information into the network. Basic cryptographic security mechanisms are often not effective in this situation. Most techni ..."
Abstract
- Add to MetaCart
Sensor networks are often subject to physical attacks. Once a node’s cryptographic key is compromised, an attacker may completely impersonate it, and introduce arbitrary false information into the network. Basic cryptographic security mechanisms are often not effective in this situation. Most
A Framework for Identifying Compromised Nodes in Sensor Networks
"... Sensor networks are often subject to physical attacks. Once a node’s cryptographic key is compromised, an attacker may completely impersonate it, and introduce arbitrary false information into the network. Basic cryptographic security mechanisms are often not effective in this situation. Most techni ..."
Abstract
- Add to MetaCart
Sensor networks are often subject to physical attacks. Once a node’s cryptographic key is compromised, an attacker may completely impersonate it, and introduce arbitrary false information into the network. Basic cryptographic security mechanisms are often not effective in this situation. Most
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
"... Sensor networks are often subject to physical attacks. Once a node’s cryptographic key is compromised, an attacker may completely impersonate it and introduce arbitrary false information into the network. Basic cryptographic mechanisms are often not effective in this situation. Most techniques to ad ..."
Abstract
-
Cited by 25 (3 self)
- Add to MetaCart
Sensor networks are often subject to physical attacks. Once a node’s cryptographic key is compromised, an attacker may completely impersonate it and introduce arbitrary false information into the network. Basic cryptographic mechanisms are often not effective in this situation. Most techniques
A SECURITY FRAMEWORK FOR SERVICE OVERLAYS: OPERATING IN THE PRESENCE OF COMPROMISED NODES
"... In this paper we explore an important issue for many over-lay networks- the presence of compromised nodes and how they affect the operation of the system. In overlay networks, compromised nodes can drop, delay or in other ways subvert user traffic and break protocols required for the successful oper ..."
Abstract
- Add to MetaCart
In this paper we explore an important issue for many over-lay networks- the presence of compromised nodes and how they affect the operation of the system. In overlay networks, compromised nodes can drop, delay or in other ways subvert user traffic and break protocols required for the successful
On Resiliency to Compromised Nodes: A Case for Location Based Security in Sensor Networks
"... Node compromise poses severe security threats in sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold of compromised nodes; the security protection completely breaks down when the threshold is exceeded. This paper studies how to achieve resiliency again ..."
Abstract
- Add to MetaCart
Node compromise poses severe security threats in sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold of compromised nodes; the security protection completely breaks down when the threshold is exceeded. This paper studies how to achieve resiliency
Using FIRE and ICE for detecting and recovering compromised nodes in sensor networks
, 2004
"... This paper presents a suite of protocols called FIRE (Forgery-resilient Intrusion detection, Recovery, and Establishments of keys), for detecting and recovering compromised nodes in sensor networks. FIRE consists of two protocols: an intrusion detection and code update protocol, and a cryptographic ..."
Abstract
-
Cited by 8 (2 self)
- Add to MetaCart
This paper presents a suite of protocols called FIRE (Forgery-resilient Intrusion detection, Recovery, and Establishments of keys), for detecting and recovering compromised nodes in sensor networks. FIRE consists of two protocols: an intrusion detection and code update protocol, and a cryptographic
Compromised Node Detection and Revocation in Zone Framed Networks for Wireless Sensor Networks
"... Sensor nodes are usually deployed in an open environment therefore they are subjected to various kinds of attacks like Worm Hole attack, Black Hole attack, False Data Injection attacks. Since the attackers can cause disruption and failure to the network, it’s very important to detect these compromis ..."
Abstract
- Add to MetaCart
these compromised nodes and revoke them before any major disruption occurs. Therefore, it’s very important to safe guard the network from further disruption. For this purpose a method called Biased SPRT (Sequential Probability Ratio Test) is used by setting up some Threshold Value and Trust Aggregator
Ariadne: a secure on-demand routing protocol for ad hoc networks," in
- Proc. 8th ACM International Conf. Mobile Computing Networking ,
, 2002
"... Abstract An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing prob ..."
Abstract
-
Cited by 925 (12 self)
- Add to MetaCart
or compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes, and also prevents many types of Denial-of-Service attacks. In addition, Ariadne is efficient, using only highly efficient symmetric cryptographic primitives.
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks
, 2003
"... this paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a new key pre-distribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resili ..."
Abstract
-
Cited by 552 (18 self)
- Add to MetaCart
resilience and associated overhead. Our scheme exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that communications between any additional nodes are compromised is close to zero. This desirable property lowers the initial payoff of smaller
Results 1 - 10
of
1,542