A Comparative Evaluation of Two Intrusion-tolerant Routing Protocols for Wireless Sensor Networks

被引:0
|
作者
Vinh Hoa La [1 ]
Cavalli, Ana R. [1 ]
机构
[1] Telecom SudParis, Dept Wireless Networks & Multimedia Serv, 9 Rue Charles Fourier, F-91011 Evry, France
关键词
Intrusion-tolerance; Wireless Sensor Networks; Security; Attack tolerance; Routing; Performance Evaluation;
D O I
10.1109/BWCCA.2015.104
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor Networks (WSNs) have emerged recently as one of the most attractive research subjects. The resource-constraint characteristics of WSNs limit the secure design and development of security protocols and presumably thwart the integration of an intrusion detection system (IDS). Whilst, sensor nodes which usually operate in unattended and even harsh environments, are prone to failures and vulnerable to malicious attacks. For reliable and secure communications in WSNs, intrusion-tolerant routing becomes possibly a critical attribute that should be integrated into WSNs. However, there was not much research investigated on this topic. In order to provide a useful starting point for researchers interested in the subject, in this paper, we comparatively study two intrusion-tolerant routing protocols for WSNs, namely INSENS and ITSRP. Simulations were especially invested to assess their practicality. We also propose some suggestions to improve these two protocols. Although the feasibility of our suggestions is still questionable and deserves more investigation, we consider this study as the first step to fulfill the design of intrusion-tolerant WSNs as well as to build a complete intrusion-tolerant framework hereafter.
引用
收藏
页码:6 / 12
页数:7
相关论文
共 50 条
  • [1] A performance evaluation of intrusion-tolerant routing in wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    INFORMATION PROCESSING IN SENSOR NETWORKS, PROCEEDINGS, 2003, 2634 : 349 - 364
  • [2] INSENS: Intrusion-tolerant routing for wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    COMPUTER COMMUNICATIONS, 2006, 29 (02) : 216 - 230
  • [3] An Evaluation Model of Intrusion-Tolerant Topology Availability for Wireless Sensor Networks
    Xiong Shu-ming
    Qu Xiao-qian
    Zhan Yong-zhao
    Wang Xin-sheng
    Wang Liang-min
    MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 29 - 34
  • [4] Intrusion-Tolerant Framework for Heterogeneous Wireless Sensor Networks
    Sliti, Maha
    Hamdi, Mohamed
    Boudriga, Noureddine
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 633 - 636
  • [5] ITB: Intrusion-tolerant broadcast protocol in wireless sensor networks
    Lee, Jin Wook
    Lee, Yann-Hang
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 505 - 514
  • [6] An Intrusion-tolerant Secure Routing Protocol with Key Exchange for Wireless Sensor Network
    Zhou, Jiliang
    Li, Caixia
    Cao, Qiying
    Shen, Yu
    2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 1547 - 1552
  • [7] Performance Evaluation of Routing Protocols in Wireless Sensor Networks: A Comparative Study
    Zaghal, Raid
    Alyounis, Fadi
    Salah, Saeed
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATICS AND APPLICATIONS (ICIA2016), 2016, : 63 - 70
  • [8] Secure and Intrusion-tolerant Communication in Wireless Mesh Networks
    Guo Yuan-bo
    Hao Yao-hui
    Wang Chao
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 694 - +
  • [9] Comparative Analysis on Routing Protocols in Wireless Sensor Networks
    TamilSelviGnanasekaran
    Francis, Sharmila Anand John
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [10] A Comparative Study of Wireless Sensor Networks and Their Routing Protocols
    Bhattacharyya, Debnath
    Kim, Tai-hoon
    Pal, Subhajit
    SENSORS, 2010, 10 (12) : 10506 - 10523