A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Reliability and Performability Modeling Using SHARPE 2000
TOOLS '00 Proceedings of the 11th International Conference on Computer Performance Evaluation: Modelling Techniques and Tools
SHARPE 2002: Symbolic Hierarchical Automated Reliability and Performance Evaluator
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Software Rejuvenation: Analysis, Module and Applications
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Constraint-guided dynamic reconfiguration in sensor networks
Proceedings of the 3rd international symposium on Information processing in sensor networks
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Architectures of Increased Availability Wireless Sensor Network Nodes
ITC '04 Proceedings of the International Test Conference on International Test Conference
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Stabilizing Reconfiguration in Wireless Sensor Networks
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
An Efficient Key Revocation Protocol for Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Sluice: Secure Dissemination of Code Updates in Sensor Networks
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
SCUBA: Secure Code Update By Attestation in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
A rejuvenation methodology of cluster recovery
CCGRID '05 Proceedings of the Fifth IEEE International Symposium on Cluster Computing and the Grid - Volume 01
Diversify sensor nodes to improve resilience against node compromise
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Autonomous and distributed node recovery in wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Secure Distributed Cluster Formation in Wireless Sensor Networks
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Resilient Cluster Formation for Sensor Networks
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
SRDS '07 Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems
Proactive management of software aging
IBM Journal of Research and Development
Survivability for Wireless Sensor Network: Model, Evaluation and Experiment
NCM '09 Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC
Survivability evaluation of cluster-based wireless sensor network under DoS attacks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Detecting node compromise in hybrid wireless sensor networks using attestation techniques
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Re-visited: denial of service resilient access control for wireless sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
IEEE Communications Magazine
Hi-index | 0.09 |
In this paper, we present a survivability evaluation model and analyze the performance of Wireless Sensor Networks (WSNs) under attack and key compromise. First, we present a survivability evaluation model of WSNs by representing the states of WSNs under attack. Here, the survivability of WSNs is expressed as a continuous time Markov Chain to describe the status of real WSNs. We propose a threshold condition to trigger the transition between the states of WSNs in the face of DoS attack. According to the threshold conditions, the survivability model is capable of taking action(s) and enables the formalization of the effect of action(s). We present an analytical model and numerical analysis to show the feasibility of our work in terms of availability, survivability, and cost. Second, we present a survivability model and evaluation of WSNs under key compromise. Sensor nodes in a network can be captured by an adversary. The compromised node can be identified by one of the intrusion detection mechanisms. After detecting the compromised node, the key in the node has to be revoked. In this paper, we present the effect of key compromise and key revocation in WSNs. We additionally present a survivability evaluation model using the SHARPE simulation tool in terms of availability.