• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Security considerations in ad hoc sensor networks” (2005)

by Fei Hu
Venue:Ad Hoc Networks,
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 35
Next 10 →

Computational Intelligence in Wireless Sensor Networks: A Survey

by Raghavendra V. Kulkarni, Anna Förster, Ganesh Kumar Venayagamoorthy - IEEE COMMUNICATIONS SURVEYS & TUTORIALS , 2011
"... Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many challenges, mainly caused by communication failures, storage and computational constraints and limited power supply. Paradigms o ..."
Abstract - Cited by 41 (0 self) - Add to MetaCart
Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many challenges, mainly caused by communication failures, storage and computational constraints and limited power supply. Paradigms of computational intelligence (CI) have been successfully used in recent years to address various challenges such as data aggregation and fusion, energy aware routing, task scheduling, security, optimal deployment and localization. CI provides adaptive mechanisms that exhibit intelligent behavior in complex and dynamic environments like WSNs. CI brings about flexibility, autonomous behavior, and robustness against topology changes, communication failures and scenario changes. However, WSN developers are usually not or not completely aware of the potential CI algorithms offer. On the other side, CI researchers are not familiar with all real problems and subtle requirements of WSNs. This mismatch makes collaboration and development difficult. This paper intends to close this gap and foster collaboration by offering a detailed introduction to WSNs and their properties. An extensive survey of CI applications to various problems in WSNs from various research areas and publication venues is presented in the paper. Besides, a discussion on advantages and disadvantages of CI algorithms over traditional WSN solutions is offered. In addition, a general evaluation of CI algorithms is presented, which will serve as a guide for using CI algorithms for WSNs.

Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach

by Sajal K. Das - International Journal of Network Security , 2007
"... In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor network, where some of these nodes act maliciously. We propose a protocol based on game theory which achieves the design obj ..."
Abstract - Cited by 18 (0 self) - Add to MetaCart
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor network, where some of these nodes act maliciously. We propose a protocol based on game theory which achieves the design objectives of truthfulness by recognizing the presence of nodes that agree to forward packets but fail to do so. This approach categorizes different nodes based upon their dynamically measured behavior. Through simulation we evaluate proposed protocol using packet throughput and the accuracy of misbehaving node detection.

Topology Control for Secured Coverage in Wireless Sensor Networks

by Zhen Jiang, et al. , 2007
"... In this paper, we present a new control method that makes some node adjustments in local areas in an effort to cover the “holes” in wireless sensor networks. Many security applications often face the problem of holes when some sensor nodes are disabled from the collaboration due to their failures an ..."
Abstract - Cited by 7 (3 self) - Add to MetaCart
In this paper, we present a new control method that makes some node adjustments in local areas in an effort to cover the “holes” in wireless sensor networks. Many security applications often face the problem of holes when some sensor nodes are disabled from the collaboration due to their failures and misbehavior. Affected by malicious attacks, these holes may occur dynamically and such a problem cannot be solved completely by simply deploying more redundant sensors. We propose a snake-like cascading replacement process in a local area in order to fill in the vacant area with trusted nodes. Only 1-hop neighborhood is used in our approach. Its implementations under both a passive model and an active model are discussed. The simulation results of our new control method show substantial improvements in total moving distance, total number of moves, and process converging speeds, compared with the best result known to date.
(Show Context)

Citation Context

...s range from environmental monitoring to surveillance to target detection. Due to the fact that sensors can very easily fail or misbehave, many nodes should be isolated from the network collaboration =-=[9]-=-. Thus, a “hole” in the surveillance area may occur in the deployed area, and ∗The work was supported in part by NSF grants CNS 0422762, CNS 0434533, CNS 0531410, and CNS 0626240. such an occurrence m...

Mobility control for complete coverage in wireless sensor network

by Z Jiang, J Wu, R Kline - Proceedings of the 28th International Conference on Distributed Computing Systems Workshops,pp.291-296, 2008
"... ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
Abstract not found

DISH: Distributed Self-Healing (in Unattended Sensor Networks)

by Di Ma, Gene Tsudik
"... Abstract. Unattended wireless sensor networks (UWSNs) operating in hostile environments face the risk of compromise. Unable to off-load collected data to a sink or some other trusted external entity, sensors must protect themselves by attempting to mitigate potential compromise and safeguarding thei ..."
Abstract - Cited by 5 (4 self) - Add to MetaCart
Abstract. Unattended wireless sensor networks (UWSNs) operating in hostile environments face the risk of compromise. Unable to off-load collected data to a sink or some other trusted external entity, sensors must protect themselves by attempting to mitigate potential compromise and safeguarding their data. In this paper, we focus on techniques that allow unattended sensors to recover from intrusions by soliciting help from peer sensors. We define a realistic adversarial model and show how certain simple defense methods can result in sensors re-gaining secrecy and authenticity of collected data, despite adversary’s efforts to the contrary. We present an extensive analysis and a set of simulation results that support our observations and demonstrate the effectiveness of proposed techniques. 1
(Show Context)

Citation Context

...tive) approaches and hope to report on our findings in the near future. 8 Related Work Data secrecy is a fundamental security issue in sensor networks and encryption is the standard way to achieve it =-=[13, 14]-=-. Much research effort has been invested in clever techniques for establishing pairwise keys used to secure sensor-to-sensor and sink-to-sensor communication, e.g., [15–18]. Sensor compromise is viabl...

Article A Lightweight Data Integrity Scheme for Sensor Networks

by Ibrahim Kamel, Hussam Juma
"... sensors ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Abstract not found

Security considerations of underwater acoustic networks,” in Proceedings of 20th T ra n sm is si o n d is ta n ce ( in m et re s) percentage of nodes as CH 62 A Cluster based

by Yangze Dong , Pingxiang Liu - Key Management Scheme for Underwater Wireless Sensor Networks Copyright © 2015 MECS I.J. Computer Network and Information Security, 2015, 9, 54-63 International Congress on Acoustics
"... ABSTRACT Recent researches on Underwater Acoustic Network (UAN) mainly focused on the construction and management. Though these studies have covered nearly all the respects within the UAN infrastructure, few efforts have been made for its security, which is surely an important consideration when pu ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
ABSTRACT Recent researches on Underwater Acoustic Network (UAN) mainly focused on the construction and management. Though these studies have covered nearly all the respects within the UAN infrastructure, few efforts have been made for its security, which is surely an important consideration when put into practices. This paper focuses to the security considerations of UAN. Within the paper, the characteristics of UAN are analyzed firstly, and comparisons between the common-used networks are performed. Thereafter, the application environments of UAN are studied and the goals and challenges of a secure UAN are investigated. Based upon the above studies, the security threats are classified according to their harm to UAN, and corresponding countermeasures against them are taken into considerations.
(Show Context)

Citation Context

... the ability of self-cure [2]. A simulation had proved its validity via a selforganization protocol [4]. D. Brief Discussion The proposed measures on the security of UAN above all need extra resources in UAN. Since the resources in UAN are very limited, such as storage, processing, and power supply, etc., there must be a tradeoff between the security and consumptions. When to Implement the Security Measures? The lessons taught in Internet and other networks show that if security measures are added as mends when the problems have arisen, the cost will be enormous, together with limited effects [7]. Therefore, measures on security must be taken into consideration at the beginning of the construction of UAN, and be carried out simultaneously during the construction. SUMMARY The technologies of UAN have been studied for over 30 years. It has come to a pre-practical developing stage. But the security measures are not carried out simultaneously. Based on the analysis of the related problems concerning the security of UAN, such as the intrinsic characteristics and the environments, the goals and challenges of a secure UAN put forward, and the security considerations are presented. Since the ...

Forward secure communication in wireless sensor networks

by Sjouke Mauw, Ivo Van Vessem, Bert Bos - In SPC ’06: Proceedings of the 3rd International Conference on Security in Pervasive Computing (York, United Kingdom), Lecture Notes in Computer Science
"... Abstract We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Abstract We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks. As a bonus we obtain implicit weak freshness without message expansion. We take the typical resource constraints of wireless sensor networks into account. The security provisions can be superimposed on several communication models, such as the epidemic communication model. 1
(Show Context)

Citation Context

...Schoenmakers for his helpful comments on the verification and to Maarten van Steen for introducing us to the Gossip communication model. 2 Related Work General sensor network security surveys include =-=[15,6,11]-=-. Closest to our work is [16], in particular SNEP, which is the part based around a single block cipher that is used for authentication, confidentiality, and random number generation. The key differen...

On scalable security model for sensor networks protocols, in

by B. Księżopolski, Z. Kotulski - Schapke [eds], CIB-W78 2005, 22 nd Conference Information Technology in Construction, Dresden , 2005
"... ABSTRACT: Distributed sensor networks meet many different barriers that reduce their efficient applicability. One of them is requirement of assurance of the information security when it is transmitted, transformed, and stored in the electronic service. It is possible to provide an appropriate level ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
ABSTRACT: Distributed sensor networks meet many different barriers that reduce their efficient applicability. One of them is requirement of assurance of the information security when it is transmitted, transformed, and stored in the electronic service. It is possible to provide an appropriate level of security applying the present-day information technology. However, the level of the protection of information applied to the whole network is often much higher than it is necessary to meet potential threats. Since the level of security strongly affects the performance of whole system, the excessive protection decreases the system’s reliability and availability and, as a result, the global security of the construction. In this paper we present a model of scalable security for digital information transmission systems for the sensor network. In our model the basic element is the risk management procedure leading to an adequate protection level.
(Show Context)

Citation Context

...ic reviews of the security tools can be found at the literature (Menezes et al. 1997, Anderson 2001, Groves 2001, Pietro et al. 2002, Patel et al. 2002, Chlamtac et al. 2003, Kulesza & Kotulski 2003, =-=Hu & Sharma 2005-=-). In this paper we concentrate on describing conditions for appropriate selection of the countermeasures adequate for a certain level of threats. 3 SYSTEM ASSUMPTION Before we outline the model of sc...

Di-Sec: A Distributed Security Framework for Heterogeneous Wireless Sensor Networks

by Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Yingshu Li, Raheem Beyah - in In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM , 2012
"... Abstract—Wireless Sensor Networks (WSNs) are deployed for monitoring in a range of critical domains (e.g., health care, military, critical infrastructure). Accordingly, these WSNs should be resilient to attacks. The current approach to defending against malicious threats is to develop and deploy a s ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract—Wireless Sensor Networks (WSNs) are deployed for monitoring in a range of critical domains (e.g., health care, military, critical infrastructure). Accordingly, these WSNs should be resilient to attacks. The current approach to defending against malicious threats is to develop and deploy a specific defense mechanism for a specific attack. However, the problem with this traditional approach to defending sensor networks is that the solution for the Jamming attack does not defend against other attacks (e.g., Sybil and Selective Forwarding). In reality, one cannot know a priori what type of attack an adversary will launch. This work addresses the challenges with the traditional approach to securing sensor networks and presents a comprehen-sive framework, Di-Sec, that can defend against all known and forthcoming attacks. At the heart of Di-Sec lies the monitoring core (M-Core), which is an extensible and lightweight layer that
(Show Context)

Citation Context

...s a significant and open research problem which has been discussed extensively in earlier studies. Some studies provide classifications and address the relevant issues from a general perspective [8], =-=[9]-=-. Other studies focus only on a particular layer of protocols [8], [10], [11] identifying various common attacks like Jamming (physical layer), Sybil (MAC layer), and Selective Forwarding (network lay...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University