INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks

作者: Shivakant Mishra , Richard Han , Jing Deng

DOI:

关键词:

摘要: This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS constructs forwarding tables at each node to facilitate communication between sensor nodes and a base station. It minimizes computation, communication, storage, bandwidth requirements the expense of increased does not rely on detecting intrusions, but rather tolerates intrusions by bypassing malicious nodes. An important property is that while may be able compromise small number in its vicinity, it cannot cause widespread damage network. A prototype implementation ns2click simulator presented demonstrate assess INSENS's tolerance attacks launched intruder random

参考文章(16)
Kan Zhang, Efficient Protocols for Signing Routing Messages. network and distributed system security symposium. ,(1998)
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, SPINS Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01. pp. 189- 199 ,(2001) , 10.1145/381677.381696
Yih-Chun Hu, Adrian Perrig, David B. Johnson, Ariadne: Proceedings of the 8th annual international conference on Mobile computing and networking - MobiCom '02. pp. 12- 23 ,(2002) , 10.1145/570645.570648
Yih-Chun Hu, Adrian Perrig, David B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols workshop on wireless security. pp. 30- 40 ,(2003) , 10.1145/941311.941317
Yih-Chun Hu, David B. Johnson, Adrian Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks Ad Hoc Networks. ,vol. 1, pp. 175- 192 ,(2003) , 10.1016/S1570-8705(03)00019-2
Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru, Herbert Rubens, An on-demand secure routing protocol resilient to byzantine failures Proceedings of the ACM workshop on Wireless security - WiSE '02. pp. 21- 30 ,(2002) , 10.1145/570681.570684
Panagiotis Papadimitratos, Zygmunt J. Haas, Emin Gün Sirer, Path set selection in mobile ad hoc networks Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '02. pp. 1- 11 ,(2002) , 10.1145/513800.513802
Mihir Bellare, Ran Canetti, Hugo Krawczyk, Keying Hash Functions for Message Authentication international cryptology conference. pp. 1- 15 ,(1996) , 10.1007/3-540-68697-5_1
Josh Broch, David A Maltz, David B Johnson, Yih-Chun Hu, Jorjeta Jetcheva, None, A performance comparison of multi-hop wireless ad hoc network routing protocols acm/ieee international conference on mobile computing and networking. pp. 85- 97 ,(1998) , 10.1145/288235.288256
Elizabeth M Royer, Chai-Keong Toh, A review of current routing protocols for ad hoc mobile wireless networks IEEE Personal Communications. ,vol. 6, pp. 46- 55 ,(1999) , 10.1109/98.760423