Intrusion-Tolerant Framework for Heterogeneous Wireless Sensor Networks

被引:2
|
作者
Sliti, Maha [1 ]
Hamdi, Mohamed [1 ]
Boudriga, Noureddine [1 ]
机构
[1] Univ Carthage, Commun Networks & Secur Res Lab, Carthage, Tunisia
关键词
Wireless sensor networks; intrusion-tolerance; intermediate signature verification;
D O I
10.1109/AICCSA.2009.5069393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attacks against Wireless Sensor Networks (WSNs) are becoming more and more frequent. Due to the sensitive nature of these networks, appropriate security mechanisms should therefore be developed. This paper introduces a fault-tolerant approach for WSNs. The basic idea to detect malicious nodes is to proceed to intermediate verification of the signed messages within the communication paths. A tolerance state is defined in which a set of tests are performed on the malicious node in order to definitely reject it or rehabilitate it.
引用
收藏
页码:633 / 636
页数:4
相关论文
共 50 条
  • [31] A Virtual Sensor Scheduling Framework for Heterogeneous Wireless Sensor Networks
    Hu, Wen
    O'Rourke, Damien
    Kusy, Branislav
    Wark, Tim
    PROCEEDINGS OF THE 2013 38TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2013), 2013, : 655 - 658
  • [32] A Method for Fault Tolerant Localization of Heterogeneous Wireless Sensor Networks
    Bhat, Soumya J.
    Santhosh, K. V.
    IEEE ACCESS, 2021, 9 : 37054 - 37063
  • [33] An intrusion-tolerant password authentication system
    Wang, XH
    Heydari, MH
    Lin, H
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 110 - 118
  • [34] A Comparison of Intrusion-Tolerant System Architectures
    Nguyen, Quyen L.
    Sood, Arun
    IEEE SECURITY & PRIVACY, 2011, 9 (04) : 24 - 31
  • [35] A lightweight intrusion-tolerant overlay network
    Obelheiro, Rafael R.
    Fraga, Joni da Silva
    NINTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT AND COMPONENT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 496 - 503
  • [36] Evaluating Intrusion-Tolerant Certification Authority Systems
    Lin, Jingqiang
    Jing, Jiwu
    Liu, Peng
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2012, 28 (08) : 825 - 841
  • [37] A comprehensive fault-tolerant framework for wireless sensor networks
    Afsar, Mehdi
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3247 - 3261
  • [38] Deploying Intrusion-Tolerant SCADA for the Power Grid
    Babay, Amy
    Schultz, John
    Tantillo, Thomas
    Beckley, Samuel
    Jordan, Eamon
    Ruddell, Kevin
    Jordan, Kevin
    Amir, Yair
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 328 - 335
  • [39] Probabilistic validation of an intrusion-tolerant replication system
    Singh, S
    Cukier, M
    Sanders, WH
    2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 615 - 624
  • [40] Intrusion-tolerant server architecture for survivable services
    Min, YJ
    JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 93 - 102