Distributed Self-Healing Protocol for Unattended Wireless Sensor Network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Distributed Self-Healing Protocol for Unattended Wireless Sensor Network

Authors: E. Golden Julie, E. Sahaya Rose Vigita, S. Tamil Selvi

Abstract:

Wireless sensor network is vulnerable to a wide range of attacks. Recover secrecy after compromise, to develop technique that can detect intrusions and able to resilient networks that isolates the point(s) of intrusion while maintaining network connectivity for other legitimate users. To define new security metrics to evaluate collaborative intrusion resilience protocol, by leveraging the sensor mobility that allows compromised sensors to recover secure state after compromise. This is obtained with very low overhead and in a fully distributed fashion using extensive simulations support our findings.

Keywords: WSN security, intrusion resilience, compromised sensors, mobility.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1337579

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1761

References:


[1] “Wireless sensor networks: a survey” I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam, E. Cayirci Broadband and Wireless Networking Laboratory, School of Electrical and Computer Engineering, USA Received 12 December 2001; accepted 20 December 2001
[2] “Data Security in Unattended Wireless Sensor Networks” Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik.2009
[3] “New Adversary and New Threats: Security in Unattended Sensor Networks” Di Ma, Claudio Soriente and Gene TsudikComputer Science Department University of California, 2009
[4] "Mobility and mobility management: a conceptual framework". Proc. 10th IEEE International Conference on Networks. Retrieved 23 February 2009.
[5] “Mobility Improves Coverage of Sensor Networks” Benyuan LiuDept. Peter BrassDept. of Computer ScienceCity College of New YorkNew York, 2009
[6] “A Survey Of Mobility Models in Wireless Adhoc Networks “Fan Bai and Ahmed Helmy University of Southern California,U.S.A .2002
[7] “The Keyed-Hash Message Authentication Code (HMAC)” Information Technology Laboratory National Institute of Standards and Technology. 2010
[8] “Key-Insulated Public Key Cryptosystems”Yevgeniy Dodis1, Jonathan Katz2, Shouhuai Xu3, and Moti Yung41 Department of Computer Science, New York University.2010
[9] “Intrusion-Resilience in Mobile Unattended WSNs” Roberto Di Pietro , Gabriele Oligeri, Claudio Soriente , Gene Tsudik ISTI-CNR, Pisa Research Area, Pisa, Italy Computer Science Department, University of California, Irvine, USA.2010
[10] E.P.G.D. Murphy and W. Marnane, “Area-Efficient Processor for Public-Key Cryptography in Wireless Sensor Networks,” Proc.Second Int’l Conf. Sensor Technologies and Applications.2009
[11] R. Wang, W. Du, X. Liu, and P. Ning, “ShortPK: A Short-TermPublic Key Scheme for Broadcast Authentication in SensorNetworks,” ACM Trans. Sensor Networks, vol. 6, pp. 9:1-9:29, Jan.2010.
[12] V. Shoup, “OAEP Reconsidered,” Proc. 21st Ann. Int’l Cryptology Conf. (CRYPTO ’01), pp. 239-259, 2001.