Intrusion-Tolerant Framework for Heterogeneous Wireless Sensor Networks

被引:2
|
作者
Sliti, Maha [1 ]
Hamdi, Mohamed [1 ]
Boudriga, Noureddine [1 ]
机构
[1] Univ Carthage, Commun Networks & Secur Res Lab, Carthage, Tunisia
关键词
Wireless sensor networks; intrusion-tolerance; intermediate signature verification;
D O I
10.1109/AICCSA.2009.5069393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attacks against Wireless Sensor Networks (WSNs) are becoming more and more frequent. Due to the sensitive nature of these networks, appropriate security mechanisms should therefore be developed. This paper introduces a fault-tolerant approach for WSNs. The basic idea to detect malicious nodes is to proceed to intermediate verification of the signed messages within the communication paths. A tolerance state is defined in which a set of tests are performed on the malicious node in order to definitely reject it or rehabilitate it.
引用
收藏
页码:633 / 636
页数:4
相关论文
共 50 条
  • [41] A novel intrusion-tolerant approach for Internet access
    Wen, Yan
    Zhao, Jinjing
    Wang, Huaimin
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 485 - +
  • [42] Intrusion-tolerant server architecture for survivable services
    Min B.J.
    Journal of Supercomputing, 2005, 33 (01): : 93 - 102
  • [43] BackupIT: An Intrusion-Tolerant Cooperative Backup System
    Loest, Sergio
    Madruga, Marcelo
    Maziero, Carlos
    Lung, Lau
    PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 724 - +
  • [44] Fault-tolerant topology control for heterogeneous wireless sensor networks
    Cardei, Mihaela
    Yang, Shuhui
    Wu, Jie
    2007 IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3, 2007, : 4 - 12
  • [45] Algorithms for fault-tolerant topology in heterogeneous wireless sensor networks
    Cardei, Mihaela
    Yang, Shuhui
    Wu, Jie
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, 19 (04) : 545 - 558
  • [46] On the effects of finite memory on intrusion-tolerant systems
    Veronese, Giuliana Santos
    Correia, Miguel
    Lung, Lau Cheuk
    Verissimo, Paulo
    13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 401 - 404
  • [47] DiveInto: Supporting Diversity in Intrusion-Tolerant Systems
    Antunes, Joao
    Neves, Nuno
    2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2011, : 137 - 146
  • [48] A novel Rule Based Intrusion Detection Framework for Wireless Sensor Networks
    Eswari, T.
    Vanitha, V.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 1019 - 1022
  • [49] A Framework for Agent-based Intrusion Detection in Wireless Sensor Networks
    Pires, Higo
    Abdelouahab, Zair
    Lopes, Denivaldo
    Santos, Mario
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [50] On the correctness of an intrusion-tolerant group communication protocol
    Layouni, M
    Hooman, J
    Tahar, S
    CORRECT HARDWARE DESIGN AND VERIFICATION METHODS, PROCEEDINGS, 2003, 2860 : 231 - 246