Locating compromised sensor nodes through incremental hashing authentication

  • Authors:
  • Youtao Zhang;Jun Yang;Lingling Jin;Weijia Li

  • Affiliations:
  • Computer Science Department, University of Pittsburgh, Pittsburgh, PA;Computer Science and Engineering Department, University of California at Riverside, Riverside, CA;Computer Science and Engineering Department, University of California at Riverside, Riverside, CA;Computer Science Department, University of Pittsburgh, Pittsburgh, PA

  • Venue:
  • DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
  • Year:
  • 2006

Quantified Score

Hi-index 0.01

Visualization

Abstract

While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a COmpromised nOde Locating protocol for detecting and locating compromised nodes once they misbehave in the sensor network. We exploit a proven collision-resilient incremental hashing algorithm and design secure steps to confidently locate compromised nodes. The scheme can also be combined with existing en-route false report filtering schemes to achieve both early false report dropping and accurate compromised nodes isolation.