Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
Poster abstract: LEAP—efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Node-Disjoint Parallel Multi-Path Routing in Wireless Sensor Networks
ICESS '05 Proceedings of the Second International Conference on Embedded Software and Systems
A Novel Multipath Disjoint Routing to Support Ad Hoc Wireless Sensor Networks
ISORC '06 Proceedings of the Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing
Avrora: scalable sensor network simulation with precise timing
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
A secure alternate path routing in sensor networks
Computer Communications
Secure Multipath Routing Protocol for Wireless Sensor Networks
ICDCSW '07 Proceedings of the 27th International Conference on Distributed Computing Systems Workshops
A survey of key management schemes in wireless sensor networks
Computer Communications
On multipath routing in multihop wireless networks: security, performance, and their tradeoff
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Network coding based reliable disjoint and braided multipath routing for sensor networks
Journal of Network and Computer Applications
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fault and intrusion tolerance of wireless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Routing techniques in wireless sensor networks: a survey
IEEE Wireless Communications
A systematic method for network topology reconfiguration with limited link additions
Journal of Network and Computer Applications
Journal of Network and Computer Applications
AGRIB-BHF: A sustainable and fault tolerant aggregation
Journal of Network and Computer Applications
Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
Wireless Personal Communications: An International Journal
Cooperative secret delivery in wireless sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
In wireless sensor networks, reliability is a design goal of a primary concern. To build a comprehensive reliable system, it is essential to consider node failures and intruder attacks as unavoidable phenomena. In this paper, we present a new intrusion-fault tolerant routing scheme offering a high level of reliability through a secure multipath routing construction. Unlike existing intrusion-fault tolerant solutions, our protocol is based on a distributed and in-network verification scheme, which does not require any referring to the base station. Furthermore, it employs a new multipath selection scheme seeking to enhance the tolerance of the network and conserve the energy of sensors. Extensive analysis and simulations using TinyOS showed that our approach improves many important performance metrics such as: the mean time to failure of the network, detection overhead of some security attacks, energy consumption, and resilience.