Low power systems for wireless microsensors
ISLPED '96 Proceedings of the 1996 international symposium on Low power electronics and design
Internet-Based Mobile Ad Hoc Networking
IEEE Internet Computing
Denial of Service in Sensor Networks
Computer
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Protecting Mobile Code in the Wild
IEEE Internet Computing
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Design Space Exploration for Energy-Efficient Secure Sensor Network
ASAP '02 Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Processors for Mobile Applications
ICCD '00 Proceedings of the 2000 IEEE International Conference on Computer Design: VLSI in Computers & Processors
Reliability Assessment of Framework-Based Distributed Embedded Software Systems
ISSRE '02 Proceedings of the 13th International Symposium on Software Reliability Engineering
Hi-index | 0.00 |
Sensor networks are resource-constrained environments. Further, sensor networks are not physically secured, that is, sensor nodes may be physically captured and reverse engineered by the attacker. The goal of our research is to design algorithms for placing energy-efficient distributed authorisation servers (DASs) resilient to logical attack (hacking) and physical attack. A common method for achieving longer life for a sensor network is to deploy redundant nodes and to activate only a subset of nodes at one point of time. To the best of our knowledge, nobody addressed the problem of choosing the nodes to be activated. In this paper, we designed a set of algorithms to choose the set of nodes for forming the DAS between the command and the control centres (CCCs) and sensors collecting data. Our algorithms maximise the time required to compromise the security as well as to reduce the energy requirement for both authorisation and communication.