File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/WCNC.2009.4917842
- Scopus: eid_2-s2.0-70349190670
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: On attack-resilient wireless sensor networks with novel recovery strategies
Title | On attack-resilient wireless sensor networks with novel recovery strategies |
---|---|
Authors | |
Keywords | Broken communication links Leaked keys Link replacement Node capturing attacks Node replacement Recovery Wireless sensor networks |
Issue Date | 2009 |
Publisher | IEEE Communications Society. |
Citation | Ieee Wireless Communications And Networking Conference, Wcnc, 2009 How to Cite? |
Abstract | In a wireless sensor network (WSN), when an adversary physically captures one or more sensor nodes, all the information stored on these nodes may be exposed completely. Consequently, the adversary can use the information to attack the remaining part of the network. In this paper, we investigate the effects of different node capture attack patterns on state-ofthe-art key management schemes. We find that a compromised WSN can be made resilient to such attacks by introducing new resources, such as new nodes and new keys. Based on this observation, we propose two recovering strategies, namely, link replacement strategy and node replenishment strategy, to replace the compromised links and the functions of the compromised region, respectively. Simulation results indicate that our proposed strategies can improve the network resilience of a compromised WSN significantly with a small amount of additional resources. ©2009 IEEE. |
Description | proceedings of the IEEE Wireless Communications and Networking Conference, 2009, p. 1-6 |
Persistent Identifier | http://hdl.handle.net/10722/62003 |
ISSN | 2020 SCImago Journal Rankings: 0.361 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hung, KS | en_HK |
dc.contributor.author | Law, CF | en_HK |
dc.contributor.author | Lui, KS | en_HK |
dc.contributor.author | Kwok, YK | en_HK |
dc.date.accessioned | 2010-07-13T03:51:55Z | - |
dc.date.available | 2010-07-13T03:51:55Z | - |
dc.date.issued | 2009 | en_HK |
dc.identifier.citation | Ieee Wireless Communications And Networking Conference, Wcnc, 2009 | en_HK |
dc.identifier.issn | 1525-3511 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/62003 | - |
dc.description | proceedings of the IEEE Wireless Communications and Networking Conference, 2009, p. 1-6 | en_HK |
dc.description.abstract | In a wireless sensor network (WSN), when an adversary physically captures one or more sensor nodes, all the information stored on these nodes may be exposed completely. Consequently, the adversary can use the information to attack the remaining part of the network. In this paper, we investigate the effects of different node capture attack patterns on state-ofthe-art key management schemes. We find that a compromised WSN can be made resilient to such attacks by introducing new resources, such as new nodes and new keys. Based on this observation, we propose two recovering strategies, namely, link replacement strategy and node replenishment strategy, to replace the compromised links and the functions of the compromised region, respectively. Simulation results indicate that our proposed strategies can improve the network resilience of a compromised WSN significantly with a small amount of additional resources. ©2009 IEEE. | en_HK |
dc.language | eng | en_HK |
dc.publisher | IEEE Communications Society. | - |
dc.relation.ispartof | IEEE Wireless Communications and Networking Conference, WCNC | en_HK |
dc.rights | ©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | - |
dc.subject | Broken communication links | en_HK |
dc.subject | Leaked keys | en_HK |
dc.subject | Link replacement | en_HK |
dc.subject | Node capturing attacks | en_HK |
dc.subject | Node replacement | en_HK |
dc.subject | Recovery | en_HK |
dc.subject | Wireless sensor networks | en_HK |
dc.title | On attack-resilient wireless sensor networks with novel recovery strategies | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=1525-3511&volume=&spage=1&epage=6&date=2009&atitle=On+attack-resilient+wireless+sensor+networks+with+novel+recovery+strategies | - |
dc.identifier.email | Lui, KS:kslui@eee.hku.hk | en_HK |
dc.identifier.email | Kwok, YK:ykwok@eee.hku.hk | en_HK |
dc.identifier.authority | Lui, KS=rp00188 | en_HK |
dc.identifier.authority | Kwok, YK=rp00128 | en_HK |
dc.description.nature | published_or_final_version | - |
dc.identifier.doi | 10.1109/WCNC.2009.4917842 | en_HK |
dc.identifier.scopus | eid_2-s2.0-70349190670 | en_HK |
dc.identifier.hkuros | 161716 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-70349190670&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.spage | 1 | - |
dc.identifier.epage | 6 | - |
dc.publisher.place | United States | en_HK |
dc.identifier.scopusauthorid | Hung, KS=23008935900 | en_HK |
dc.identifier.scopusauthorid | Law, CF=23477563300 | en_HK |
dc.identifier.scopusauthorid | Lui, KS=7103390016 | en_HK |
dc.identifier.scopusauthorid | Kwok, YK=7101857718 | en_HK |
dc.identifier.issnl | 1525-3511 | - |