SPINS: security protocols for sensor networks
Wireless Networks
Denial of Service in Sensor Networks
Computer
Mitigating Denial of Service Attacks with Password Puzzles
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
Defending against path-based DoS attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Hi-index | 0.00 |
The design of the protocol is motivated by the observation that a single-fold security mechanism is usually not sufficient for the prevention of network attacks such as Denial of service (Dos) attacks, Sybil attacks and cannot prevent the leakage of information through covert channels; one such example being the SPINS protocol. The protocol has been designed such that major attacks are prevented and the level of data security and integrity is increased for the complete lifetime of the network. The proposed design achieves three main objectives. One being the authentication mechanism by which the malicious nodes present in the network is identified. Secondly, it takes measures to oust the identified malicious node from the network. Thirdly, it provides the transmission of the encrypted data to the base station (BS), which is collected by the deployed sensor nodes.