Reflection as a mechanism for software integrity verification
ACM Transactions on Information and System Security (TISSEC)
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
An analysis of a large scale habitat monitoring application
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Catching "Moles" in Sensor Networks
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Sensor node compromise detection: the location perspective
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
SRDS '07 Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems
Security in wireless sensor networks: Research Articles
Wireless Communications & Mobile Computing
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Efficient implementation of public key cryptosystems on mote sensors (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Capillary machine-to-machine communications: the road ahead
ADHOC-NOW'12 Proceedings of the 11th international conference on Ad-hoc, Mobile, and Wireless Networks
Hi-index | 0.00 |
Node compromise attack is a serious threat to the successful deployment of wireless sensor networks. It is a multiple-stage attack, which usually consists of three stages: physically capturing and compromising sensor nodes; redeploying the compromised nodes back to the sensor network; and compromised sensor nodes rejoining the network and launching attack. Over the last few years, much previous work has tackled the node compromise attack in the late stage, either in the second stage or in the third stage. As a result, the protection measures are often ineffective. In this paper, we will make the first effort on addressing the node compromise problem in the first stage, and present a new couple-based scheme to detect the node compromise attack in early stage. Specifically, after sensor nodes are deployed, they first build couples in ad hoc pattern. Then, the nodes within the same couple can monitor each other to detect any node compromise attempt. Extensive simulation results are given to demonstrate the high detection rate of the proposed scheme.