File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: On attack-resilient wireless sensor networks with novel recovery strategies

TitleOn attack-resilient wireless sensor networks with novel recovery strategies
Authors
KeywordsBroken communication links
Leaked keys
Link replacement
Node capturing attacks
Node replacement
Recovery
Wireless sensor networks
Issue Date2009
PublisherIEEE Communications Society.
Citation
Ieee Wireless Communications And Networking Conference, Wcnc, 2009 How to Cite?
AbstractIn a wireless sensor network (WSN), when an adversary physically captures one or more sensor nodes, all the information stored on these nodes may be exposed completely. Consequently, the adversary can use the information to attack the remaining part of the network. In this paper, we investigate the effects of different node capture attack patterns on state-ofthe-art key management schemes. We find that a compromised WSN can be made resilient to such attacks by introducing new resources, such as new nodes and new keys. Based on this observation, we propose two recovering strategies, namely, link replacement strategy and node replenishment strategy, to replace the compromised links and the functions of the compromised region, respectively. Simulation results indicate that our proposed strategies can improve the network resilience of a compromised WSN significantly with a small amount of additional resources. ©2009 IEEE.
Descriptionproceedings of the IEEE Wireless Communications and Networking Conference, 2009, p. 1-6
Persistent Identifierhttp://hdl.handle.net/10722/62003
ISSN
References

 

DC FieldValueLanguage
dc.contributor.authorHung, KSen_HK
dc.contributor.authorLaw, CFen_HK
dc.contributor.authorLui, KSen_HK
dc.contributor.authorKwok, YKen_HK
dc.date.accessioned2010-07-13T03:51:55Z-
dc.date.available2010-07-13T03:51:55Z-
dc.date.issued2009en_HK
dc.identifier.citationIeee Wireless Communications And Networking Conference, Wcnc, 2009en_HK
dc.identifier.issn1525-3511en_HK
dc.identifier.urihttp://hdl.handle.net/10722/62003-
dc.descriptionproceedings of the IEEE Wireless Communications and Networking Conference, 2009, p. 1-6en_HK
dc.description.abstractIn a wireless sensor network (WSN), when an adversary physically captures one or more sensor nodes, all the information stored on these nodes may be exposed completely. Consequently, the adversary can use the information to attack the remaining part of the network. In this paper, we investigate the effects of different node capture attack patterns on state-ofthe-art key management schemes. We find that a compromised WSN can be made resilient to such attacks by introducing new resources, such as new nodes and new keys. Based on this observation, we propose two recovering strategies, namely, link replacement strategy and node replenishment strategy, to replace the compromised links and the functions of the compromised region, respectively. Simulation results indicate that our proposed strategies can improve the network resilience of a compromised WSN significantly with a small amount of additional resources. ©2009 IEEE.en_HK
dc.languageengen_HK
dc.publisherIEEE Communications Society.-
dc.relation.ispartofIEEE Wireless Communications and Networking Conference, WCNCen_HK
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License-
dc.rightsIEEE Wireless Communications and Networking Conference. Proceedings. Copyright © IEEE Communications Society.-
dc.rights©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.-
dc.subjectBroken communication linksen_HK
dc.subjectLeaked keysen_HK
dc.subjectLink replacementen_HK
dc.subjectNode capturing attacksen_HK
dc.subjectNode replacementen_HK
dc.subjectRecoveryen_HK
dc.subjectWireless sensor networksen_HK
dc.titleOn attack-resilient wireless sensor networks with novel recovery strategiesen_HK
dc.typeConference_Paperen_HK
dc.identifier.openurlhttp://library.hku.hk:4550/resserv?sid=HKU:IR&issn=1525-3511&volume=&spage=1&epage=6&date=2009&atitle=On+attack-resilient+wireless+sensor+networks+with+novel+recovery+strategies-
dc.identifier.emailLui, KS:kslui@eee.hku.hken_HK
dc.identifier.emailKwok, YK:ykwok@eee.hku.hken_HK
dc.identifier.authorityLui, KS=rp00188en_HK
dc.identifier.authorityKwok, YK=rp00128en_HK
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.1109/WCNC.2009.4917842en_HK
dc.identifier.scopuseid_2-s2.0-70349190670en_HK
dc.identifier.hkuros161716en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-70349190670&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.spage1-
dc.identifier.epage6-
dc.publisher.placeUnited Statesen_HK
dc.identifier.scopusauthoridHung, KS=23008935900en_HK
dc.identifier.scopusauthoridLaw, CF=23477563300en_HK
dc.identifier.scopusauthoridLui, KS=7103390016en_HK
dc.identifier.scopusauthoridKwok, YK=7101857718en_HK

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats