Multicluster, mobile, multimedia radio network
Wireless Networks
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Denial of Service in Sensor Networks
Computer
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
TEEN: ARouting Protocol for Enhanced Efficiency in Wireless Sensor Networks
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Medium access control with coordinated adaptive sleeping for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
LAD: Localization Anomaly Detection forWireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Time-diffusion synchronization protocol for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Finding collisions in the full SHA-1
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
How to break MD5 and other hash functions
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (extended abstract)
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Designing secure sensor networks
IEEE Wireless Communications
An application-specific protocol architecture for wireless microsensor networks
IEEE Transactions on Wireless Communications
Adaptive clustering for mobile wireless networks
IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications
A QoS-driven approach for service-oriented device anycasting in ubiquitous environments
Computer Networks: The International Journal of Computer and Telecommunications Networking
Group-based intrusion detection system in wireless sensor networks
Computer Communications
A new method for intrusion detection on hierarchical wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A trust establishment scheme for cluster-based sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks
Expert Systems with Applications: An International Journal
Information Sciences: an International Journal
Hi-index | 0.00 |
Verifying authenticity and integrity of delivered data is indispensable for security-sensitive wireless sensor networks (WSN). Unfortunately, conventional security approaches are unsuitable for WSN because energy efficiency is really not an important issue. However, energy conservation is truly a critical issue in WSN. In this paper, a proposed hybrid security system, called energy-efficient hybrid intrusion prohibition (eHIP) system, combines intrusion prevention with intrusion detection to provide an energy-efficient and secure cluster-based WSN (CWSN). The eHIP system consists of authentication-based intrusion prevention (AIP) subsystem and collaboration-based intrusion detection (CID) subsystem. Both subsystems provide heterogeneous mechanisms for different demands of security levels in CWSN to improve energy efficiency. In AIP, two distinct authentication mechanisms are introduced to verify control messages and sensed data to prevent external attacks. These two authentication mechanisms are customized according to the relative importance of information contained in control messages and sensed data. However, because the security threat from compromised sensor nodes cannot be fully avoided by AIP, CID is therefore proposed. In CID, the concept of collaborative monitoring is proposed to balance the tradeoff between network security and energy efficiency. In order to evaluate the performance of eHIP, theoretical analyses and simulations of AIP and CID are also presented in this paper. Simulation results fully support the theoretical analysis of eHIP.