Denial of Service in Sensor Networks
Computer
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Denial-of-Service Attacks on Battery-powered Mobile Computers
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Visualization of wormholes in sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Resilient aggregation in sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Hi-index | 0.00 |
With extremely limited resources, it is hard to protect sensor networks well with conventional security mechanisms. We study a class of passive fingerprinting techniques and propose an innovative information quality based approach to improve the security of sensor network. For each sensor, we create a quality profile QP of profiling its normal/standard sensing behaviour. After deployment, new sensor readings are verified using this QP. If significant deviation is found, we either regard the readings as an abnormal behaviour or declare the sensor to be a fake sensor. The methods can be used as an assistant sensor authentication mechanism, but with a potential drawback. Furthermore, we also demonstrate a secure data fusion protocol, applying the proposed methods together with conventional security mechanisms. Through security analysis, we point out several countermeasures that can explicitly or implicitly defend against these attacks.