WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
Key infection, secrecy transfer, and key evolution for sensor networks
IEEE Transactions on Wireless Communications
Dynamic window based multihop authentication for WSN
Proceedings of the 17th ACM conference on Computer and communications security
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
ACM Transactions on Sensor Networks (TOSN)
An analysis of immunity-based statistical en-route filtering in wireless sensor networks
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
Performance evaluation of immunity-based statistical en-route filtering in wireless sensor networks
Artificial Life and Robotics
Multi-Dimensional resilient statistical en-route filtering in wireless sensor networks
GPC'10 Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks
Security and Communication Networks
Computers and Electrical Engineering
Hi-index | 0.00 |
Providing desirable data security, i.e., confidentiality, authenticity and availability, in wireless sensor networks (WSNs) is challenging, as WSNs usually consist of a large number of resource constraint sensor nodes, deployed in unattended/hostile environments, and hence are exposed to many types of severe insider attacks due to node compromise. Existing security designs mostly provide a hop-by-hop security paradigm and thus are vulnerable to such attacks. Furthermore, existing security designs are also vulnerable to various DoS attacks, such as report disruption attacks and selective forwarding attacks and thus put data availability at stake. In this paper, we seek to overcome these vulnerabilities for large-scale static WSNs. We come up with a location-aware end-to-end security framework in which secret keys are bound to geographic locations. This location-aware property effectively limits the impact of compromised nodes only to their vicinity without affecting end-to-end data security. The proposed multi-functional key management framework assures both node-to-sink and node-to-node authentication along the report forwarding routes. Moreover, the proposed data delivery approach guarantees efficient en-route bogus data filtering, and is highly robust against DoS attacks. The evaluation demonstrates that the proposed design is highly resilient against an increasing number of compromised nodes and effective in energy savings.