Intrusion-Tolerant Framework for Heterogeneous Wireless Sensor Networks

被引:2
|
作者
Sliti, Maha [1 ]
Hamdi, Mohamed [1 ]
Boudriga, Noureddine [1 ]
机构
[1] Univ Carthage, Commun Networks & Secur Res Lab, Carthage, Tunisia
关键词
Wireless sensor networks; intrusion-tolerance; intermediate signature verification;
D O I
10.1109/AICCSA.2009.5069393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attacks against Wireless Sensor Networks (WSNs) are becoming more and more frequent. Due to the sensitive nature of these networks, appropriate security mechanisms should therefore be developed. This paper introduces a fault-tolerant approach for WSNs. The basic idea to detect malicious nodes is to proceed to intermediate verification of the signed messages within the communication paths. A tolerance state is defined in which a set of tests are performed on the malicious node in order to definitely reject it or rehabilitate it.
引用
收藏
页码:633 / 636
页数:4
相关论文
共 50 条
  • [1] INSENS: Intrusion-tolerant routing for wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    COMPUTER COMMUNICATIONS, 2006, 29 (02) : 216 - 230
  • [2] A performance evaluation of intrusion-tolerant routing in wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    INFORMATION PROCESSING IN SENSOR NETWORKS, PROCEEDINGS, 2003, 2634 : 349 - 364
  • [3] ITB: Intrusion-tolerant broadcast protocol in wireless sensor networks
    Lee, Jin Wook
    Lee, Yann-Hang
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 505 - 514
  • [4] An Evaluation Model of Intrusion-Tolerant Topology Availability for Wireless Sensor Networks
    Xiong Shu-ming
    Qu Xiao-qian
    Zhan Yong-zhao
    Wang Xin-sheng
    Wang Liang-min
    MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 29 - 34
  • [5] A Comparative Evaluation of Two Intrusion-tolerant Routing Protocols for Wireless Sensor Networks
    Vinh Hoa La
    Cavalli, Ana R.
    2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 6 - 12
  • [6] Secure and Intrusion-tolerant Communication in Wireless Mesh Networks
    Guo Yuan-bo
    Hao Yao-hui
    Wang Chao
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 694 - +
  • [7] Practical Intrusion-Tolerant Networks
    Obenshain, Daniel
    Tantillo, Thomas
    Babay, Amy
    Schultz, John
    Newell, Andrew
    Hoque, Md. Endadul
    Amir, Yair
    Nita-Rotaru, Cristina
    PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 45 - 56
  • [8] An Intrusion-tolerant Secure Routing Protocol with Key Exchange for Wireless Sensor Network
    Zhou, Jiliang
    Li, Caixia
    Cao, Qiying
    Shen, Yu
    2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 1547 - 1552
  • [9] Intrusion-tolerant enclaves
    Dutertre, B
    Crettaz, V
    Stavridou, V
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
  • [10] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483