The Comparison Approach to Multiprocessor Fault Diagnosis
IEEE Transactions on Computers
A O(t3+ |E| ) Fault Identification Algorithm for Diagnosable Systems
IEEE Transactions on Computers - Fault-Tolerant Computing
A Comparison-Based Approach to Multicomputer System Diagnosis in Hybrid Fault Situations
IEEE Transactions on Computers
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Approximation algorithms
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Routing with guaranteed delivery in ad hoc wireless networks
Wireless Networks
An evidential model of distributed reputation management
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
(t, k)-Diagnosable System: A Generalization of the PMC Models
IEEE Transactions on Computers
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Parameterized Complexity of Constraint Satisfaction Problems
CCC '04 Proceedings of the 19th IEEE Annual Conference on Computational Complexity
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
LAD: Localization Anomaly Detection forWireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
An 0(n2.5) Fault Identification Algorithm for Diagnosable Systems
IEEE Transactions on Computers
Greedy Diagnosis of Hybrid Fault Situations
IEEE Transactions on Computers
Greedy Diagnosis as the Basis of an Intermittent-Fault/ Transient-Upset Tolerant System Design
IEEE Transactions on Computers
Efficient detection of compromised nodes in a wireless sensor network
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
Authenticated data compression in delay tolerant wireless sensor networks
INSS'09 Proceedings of the 6th international conference on Networked sensing systems
On verifying stateful dataflow processing services in large-scale cloud systems
Proceedings of the 17th ACM conference on Computer and communications security
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
A survey of Intrusion Detection Systems for Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
Review: Detecting node replication attacks in wireless sensor networks: A survey
Journal of Network and Computer Applications
A novel intrusion detection framework for wireless sensor networks
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Sensor networks are often subject to physical attacks. Once a node's cryptographic key is compromised, an attacker may completely impersonate it and introduce arbitrary false information into the network. Basic cryptographic mechanisms are often not effective in this situation. Most techniques to address this problem focus on detecting and tolerating false information introduced by compromised nodes. They cannot pinpoint exactly where the false information is introduced and who is responsible for it. In this article, we propose an application-independent framework for accurately identifying compromised sensor nodes. The framework provides an appropriate abstraction of application-specific detection mechanisms and models the unique properties of sensor networks. Based on the framework, we develop alert reasoning algorithms to identify compromised nodes. The algorithm assumes that compromised nodes may collude at will. We show that our algorithm is optimal in the sense that it identifies the largest number of compromised nodes without introducing false positives. We evaluate the effectiveness of the designed algorithm through comprehensive experiments.