Surviving Security: How to Integrate People, Process and Technology
Surviving Security: How to Integrate People, Process and Technology
Resilient aggregation in sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
A probabilistic voting-based filtering scheme in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Security in Sensor Networks
On the security of cluster-based communication protocols for wireless sensor networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
IEEE Communications Magazine
Statistical en-route filtering of injected false data in sensor networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Most of the sensor networks use a symmetric protocol since sensor networks are comprised of sensor nodes with restricted hardware. Sensor networks with symmetric cryptography contain a global key stored on each sensor node and may be deployed in a hostile environment. When sensors nodes are compromised, an attacker can inject false sensing reports or false Message Authentication Codes into a legitimate report. A probabilistic voting-based filtering scheme has been proposed to combat these threats from compromised nodes. However, this scheme has the problem that it cannot re-establish a session key when some nodes of the source cluster or some intermediate cluster head have been compromised. The scheme cannot also control the position of verification nodes to minimize energy consumption as topology changes. Therefore, we propose a fuzzy-based en-route filtering scheme to deal with these problems. Through performance analysis and simulation, our result shows that the proposed scheme is much more efficient than the probabilistic voting-based scheme in many cases.