Intrusion-Tolerant Framework for Heterogeneous Wireless Sensor Networks

被引:2
|
作者
Sliti, Maha [1 ]
Hamdi, Mohamed [1 ]
Boudriga, Noureddine [1 ]
机构
[1] Univ Carthage, Commun Networks & Secur Res Lab, Carthage, Tunisia
关键词
Wireless sensor networks; intrusion-tolerance; intermediate signature verification;
D O I
10.1109/AICCSA.2009.5069393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attacks against Wireless Sensor Networks (WSNs) are becoming more and more frequent. Due to the sensitive nature of these networks, appropriate security mechanisms should therefore be developed. This paper introduces a fault-tolerant approach for WSNs. The basic idea to detect malicious nodes is to proceed to intermediate verification of the signed messages within the communication paths. A tolerance state is defined in which a set of tests are performed on the malicious node in order to definitely reject it or rehabilitate it.
引用
收藏
页码:633 / 636
页数:4
相关论文
共 50 条
  • [21] Intrusion-Tolerant Location Information Services in Intelligent Vehicular Networks
    Yan, Gongjun
    Yang, Weiming
    Shaner, Earl F.
    Rawat, Danda B.
    INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II, 2011, 135 : 699 - +
  • [22] Intrusion-tolerant architectures:: Concepts and design
    Veríssimo, PE
    Neves, NF
    Correia, MP
    ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
  • [23] Intrusion Detection in Gaussian Distributed Heterogeneous Wireless Sensor Networks
    Wang, Yun
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5294 - 5299
  • [24] An architecture for an adaptive intrusion-tolerant server
    Valdes, A
    Almgren, M
    Cheung, S
    Deswarte, Y
    Dutertre, B
    Levy, J
    Saïdi, H
    Stavridou, V
    Uribe, TE
    SECURITY PROTOCOLS, 2004, 2845 : 158 - 177
  • [25] Secure intrusion-tolerant replication on the Internet
    Cachin, C
    Poritz, JA
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
  • [26] Intrusion-tolerant group management in enclaves
    Dutertre, B
    Saïdi, H
    Stavridou, V
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
  • [27] Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks
    Buccafurri, Francesco
    Coppolino, Luigi
    D'Antonio, Salvatore
    Garofalo, Alessia
    Lax, Gianluca
    Nocera, Antonino
    Romano, Luigi
    COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2014), 2014, 8666 : 214 - 229
  • [28] Randomized intrusion-tolerant asynchronous services
    Moniz, Henrique
    Neves, Nuno Ferreira
    Correia, Miguel
    Verissimo, Paulo
    DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 568 - 577
  • [29] An architecture for adaptive intrusion-tolerant applications
    Pal, Partha
    Rubel, Paul
    Atighetchi, Michael
    Webber, Franklin
    Sanders, William H.
    Seri, Mouna
    Ramasamy, HariGovind
    Lyons, James
    Courtney, Tod
    Agbaria, Adnan
    Cukier, Michel
    Gossett, Jeanna
    Keidar, Idit
    SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (11-12): : 1331 - 1354
  • [30] Building intrusion-tolerant secure software
    Zhang, T
    Zhuang, XT
    Pande, S
    CGO 2005: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2005, : 255 - 266