Summary cache: a scalable wide-area web cache sharing protocol
IEEE/ACM Transactions on Networking (TON)
Introduction to Algorithms
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Key Infection: Smart Trust for Smart Dust
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
On handling insider attacks in wireless sensor networks
Information Security Tech. Report
Randomized differential DSSS: jamming-resistant wireless broadcast communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
Jamming-resistant broadcast communication without shared keys
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
On the Detection of Clones in Sensor Networks Using Random Key Predistribution
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Primate-Inspired Communication Methods for Mobile and Static Sensors and RFID Tags
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Hi-index | 0.00 |
The great majority of processes in distributed sensor networks can only be accomplished via collaborative efforts of sensor nodes. However, the success of these processes is undermined by an attack termed controlled link establishment attack exemplified by node replication attack and key-swapping collusion attack based on their final attack goal. Countermeasures against the two latter attacks can be utilised as remedies for the controlled link establishment attack. Nevertheless, each of such countermeasures exposes its own limitations. In this paper, we propose a series of evolutionary schemes to overcome those limitations. The first two schemes are designed to be lightweight in performance at the cost of slightly weaker security robustness while the final scheme obtains much greater security by trading off small performance. Theoretical analyses, simulations, and extensive comparison with other schemes have been conducted to demonstrate the plausibility of our schemes with respect to security features and performance overheads.