Communications of the ACM
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
A certificate revocation scheme for wireless ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Robust incentive techniques for peer-to-peer networks
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Suicide for the common good: a new strategy for credential revocation in self-organizing systems
ACM SIGOPS Operating Systems Review
Maximum supported network coverage area and cost evaluation of key pre-distribution schemes
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
SybilGuard: defending against sybil attacks via social networks
IEEE/ACM Transactions on Networking (TON)
Key management schemes for distributed sensor networks
Key management schemes for distributed sensor networks
Key Management for Wireless Sensor Networks Using Trusted Neighbors
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Distributed key or node revocation facilitates the removal of compromised keys or nodes from a network without requiring a central authority. We propose a new revocation scheme, the random neighbourhood sampling node revocation, for distributed sensor networks. Our protocol is based on simple random sampling, a statistical method to estimate the property of the population through randomly sampling a minimal subset of the population. We exploit one of the inherent features of sensor networks: the sensor nodes are densely deployed, and there is a large overlap of the (wireless) coverage areas of any two neighbouring nodes. The revocation decision is made collectively by the neighbours of a suspicious node. However, instead of collecting the opinions of all neighbours of a suspicious node our scheme samples random subsets of the set of all its neighbours and of the node, which issued the warning. Our protocol is fully decentralized, incurs low communication cost, enables fast reaction to a detected intrusion, is false-detection tolerant and can be implemented with any pairwise key distribution scheme.