Next century challenges: scalable coordination in sensor networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
SPINS: security protocols for sensor networks
Wireless Networks
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Data-centric storage in sensornets
ACM SIGCOMM Computer Communication Review
Data-centric storage in sensornets with GHT, a geographic hash table
Mobile Networks and Applications
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Double rulings for information brokerage in sensor networks
Proceedings of the 12th annual international conference on Mobile computing and networking
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Self-organization of unattended wireless acoustic sensor networks for ground target tracking
Pervasive and Mobile Computing
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
IEEE Transactions on Mobile Computing
Dynamic random replication for data centric storage
Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
Journal of Medical Systems
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
STARR-DCS: Spatio-temporal adaptation of random replication for data-centric storage
ACM Transactions on Sensor Networks (TOSN)
Hi-index | 0.00 |
This paper proposes a novel mechanism to provide with security to existing Data-Centric Storage (DCS) solutions for Wireless Sensor Networks. The goal is to achieve a high security level without modifying standard DCS premises or increasing the network overhead. This means we just use the messages an operations already defined by DCS solutions. Our goal is to fulfil two security requirements: (i) only legitimate nodes for an application should be able to access the information of that application, and (ii) avoid long-term Denial of Service attacks targeting an application that operates in the network. Toward this end we define two different solutions depending on whether the sensor nodes in the network are resource-limited or powerful. We run extensive simulations and discuss the efficiency of the proposed solution under two different DCS solutions: GHT that proposes to use a single and static storage node per application, and STARR-DCS that uses multiple storage nodes per application that in addition change over the time. Based on the obtained results and discussion we conclude that changing replication nodes over the time is by itself a smart approach to avoid long-term attacks.