A secure ad-hoc routing approach using localized self-healing communities
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 4th ACM workshop on Wireless security
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Entrapping Adversaries for Source Protection in Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A secure alternate path routing in sensor networks
Computer Communications
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
ACM Transactions on Sensor Networks (TOSN)
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Anonymous topology discovery for multihop wireless sensor networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Towards event source unobservability with minimum network traffic in sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
ACM Transactions on Sensor Networks (TOSN)
Distributed Intrusion Detection Systems for Enhancing Security in Mobile Wireless Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
Location privacy and anonymity preserving routing for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
On handling insider attacks in wireless sensor networks
Information Security Tech. Report
Temporal privacy in wireless sensor networks: Theory and practice
ACM Transactions on Sensor Networks (TOSN)
Providing Source-Location Privacy in Wireless Sensor Networks
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Cross-layer enhanced source location privacy in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Preserving source-location privacy in wireless sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Query privacy in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Zeroing-in on network metric minima for sink location determination
Proceedings of the third ACM conference on Wireless network security
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Pervasive and Mobile Computing
ACM Transactions on Computer Systems (TOCS)
Protecting location privacy in large-scale wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Routing-based source-location privacy in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Source-location privacy through dynamic routing in wireless sensor networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Detecting selective forwarding attacks in wireless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Preserving source location privacy in monitoring-based wreless sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Anomaly detection in wireless sensor networks: A survey
Journal of Network and Computer Applications
ICNC'06 Proceedings of the Second international conference on Advances in Natural Computation - Volume Part II
Using data aggregation to prevent traffic analysis in wireless sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Autonomic communication security in sensor networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Attack detection vs. privacy --- how to find the link or how to hide it?
SP'11 Proceedings of the 19th international conference on Security Protocols
A survivability model in wireless sensor networks
Computers & Mathematics with Applications
Towards statistically strong source anonymity for sensor networks
ACM Transactions on Sensor Networks (TOSN)
International Journal of Ad Hoc and Ubiquitous Computing
Protecting the sink location privacy in wireless sensor networks
Personal and Ubiquitous Computing
Privacy Provisioning in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Wireless sensor networks face acute security concerns inapplications such as battlefield monitoring. A central pointof failure in a sensor network is the base station, which actsas a collection point of sensor data. In this paper, we investigatetwo attacks that can lead to isolation or failure ofthe base station. In one set of attacks, the base station is isolatedby blocking communication between sensor nodes andthe base station, e.g. by DOS attacks. In the second attack,the location of the base station is deduced by analyzing datatraffic towards the base station, which can lead to jammingand/or discovery and destruction of the base station. To defendagainst these attacks, two secure strategies are proposed.First, secure multi-path routing to multiple destinationbase stations is designed to provide intrusion toleranceagainst isolation of a base station. Second, anti-traffic analysisstrategies are proposed to help disguise the location ofthe base station from eavesdroppers. A performance evaluationis provided for a simulated sensor network, as wellas measurements of cryptographic overhead on real sensornodes.