Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A taxonomy of wireless micro-sensor network models
ACM SIGMOBILE Mobile Computing and Communications Review
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Wireless Networks
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
Designing secure sensor networks
IEEE Wireless Communications
An overview of PKI trust models
IEEE Network: The Magazine of Global Internetworking
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
A survey of communication/networking in Smart Grids
Future Generation Computer Systems
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Hi-index | 0.00 |
Ubiquitous computing, regarded as the calm technology, opens up various novel applications. It relies on the use of tiny devices embedded in everyday objects and environments, intelligently collecting and delivering information and communicating without any fixed infrastructure. Sensor networks as a sufficient enabling technology can be used as room temperatures controller, as real-time traffic monitor and can provide security in office buildings, military surveillance, etc. However, the wireless and resource-constraint nature of a sensor network makes it an ideal medium for attackers to do any kind of vicious things. In this paper, we propose a Parameterised and Localised trUst management Security (PLUS) framework that incorporates well-managed parameters and localised trust model to achieve security for wireless sensor networks. In the framework, each sensor node maintains highly abstracted parameters, rates the trustworthiness of its interested neighbours to adopt appropriate cryptographic methods, identify the malicious nodes and share the estimation locally. And also, as an application of the framework, a secure routing protocol, called PLUS_R, was designed. Results of a series of simulation experiments show that with PLUS, network can maximise security as well as minimise energy consumption. Additionally, PLUS_R shows its benefit and feasibility with security-aware route and a reasonable communication overhead.