SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Wireless sensor networks for habitat monitoring
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Developing a Heterogeneous Intrusion Tolerant CORBA System
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Secure Intrusion-tolerant Replication on the Internet
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Key Infection: Smart Trust for Smart Dust
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Building intrusion tolerant applications
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
Limiting DoS attacks during multihop data delivery in wireless sensor networks
International Journal of Security and Networks
Secure sensor network routing: a clean-slate approach
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Location privacy and anonymity preserving routing for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
International Journal of Security and Networks
A multipath secure routing protocol based on malicious node detection
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks
Proceedings of the 2010 ACM Symposium on Applied Computing
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Eliminating routing protocol anomalies in wireless sensor networks using AI techniques
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
EURASIP Journal on Wireless Communications and Networking
Journal of Network and Computer Applications
Secure routing protocol with anomaly detection in heterogeneous wireless sensor networks
International Journal of Mobile Network Design and Innovation
International Journal of Ad Hoc and Ubiquitous Computing
An anonymous distributed routing protocol in mobile ad-hoc networks
The Journal of Supercomputing
Hi-index | 0.24 |
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless sensor networks (WSNs). The key objective of an INSENS network is to tolerate damage caused by an intruder who has compromised deployed sensor nodes and is intent on injecting, modifying, or blocking packets. To limit or localize the damage caused by such an intruder, INSENS incorporates distributed lightweight security mechanisms, including efficient one-way hash chains and nested keyed message authentication codes that defend against wormhole attacks, as well as multipath routing. Adapting to WSN characteristics, the design of INSENS also pushes complexity away from resource-poor sensor nodes towards resource-rich base stations. An enhanced single-phase version of INSENS scales to large networks, integrates bidirectional verification to defend against rushing attacks, accommodates multipath routing to multiple base stations, enables secure joining/leaving, and incorporates a novel pairwise key setup scheme based on transitory global keys that is more resilient than LEAP. Simulation results are presented to demonstrate and assess the tolerance of INSENS to various attacks launched by an adversary. A prototype implementation of INSENS over a network of MICA2 motes is presented to evaluate the cost incurred.