Report Dropping and Tampering Detection in Sensor Networks: Enhancing Data Reliability

—Achieving communication dependability in Sensor networks is difficult due to limitations on node power and wireless channel unreliability. constrained sensor nodes. Simulation results show the robustness of our schemes against random and patterned node failures.

[1]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[2]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[3]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[4]  Elaine Shi,et al.  Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[5]  John Heidemann,et al.  RMST: reliable data transport in sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[7]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[8]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[9]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[10]  Deborah Estrin,et al.  Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.

[11]  Sencun Zhu,et al.  Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.

[12]  Özgür B. Akan,et al.  ESRT: event-to-sink reliable transport in wireless sensor networks , 2003, MobiHoc '03.

[13]  Ross J. Anderson,et al.  Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[14]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[15]  Wendi B. Heinzelman,et al.  Application-specific protocol architectures for wireless networks , 2000 .

[16]  Chieh-Yih Wan,et al.  PSFQ: a reliable transport protocol for wireless sensor networks , 2002, WSNA '02.

[17]  Issa M. Khalil,et al.  DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[18]  Ronitt Rubinfeld,et al.  Fast approximate PCPs , 1999, STOC '99.

[19]  Mark A. Shayman,et al.  Energy Efficient Routing in Wireless Sensor Networks , 2003 .

[20]  B. R. Badrinath,et al.  Information assurance in sensor networks , 2003, WSNA '03.

[21]  S. Khuller,et al.  Approximation algorithms for partial covering problems , 2001, J. Algorithms.

[22]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[23]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[24]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[25]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[26]  John S. Heidemann,et al.  BARD: Bayesian-assisted resource discovery in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[27]  Donggang Liu,et al.  Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.

[28]  J. J. Garcia-Luna-Aceves,et al.  Reliable data delivery in event-driven wireless sensor networks , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).

[29]  B. R. Badrinath,et al.  ReInForM: reliable information forwarding using multiple paths in sensor networks , 2003, 28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings..

[30]  Vishal Anand,et al.  SAWAN: a survivable architecture for wireless LANs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).

[31]  Deborah Estrin,et al.  Rumor Routing Algorithm For Sensor Networks , 2002 .

[32]  Laurie G. Cuthbert,et al.  Node-disjointness-based multipath routing for mobile ad hoc networks , 2004, PE-WASUN '04.

[33]  Deborah Estrin,et al.  Modelling Data-Centric Routing in Wireless Sensor Networks , 2002 .

[34]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[35]  Cauligi S. Raghavendra,et al.  PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.

[36]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[37]  Ronitt Rubinfeld,et al.  Spot-checkers , 1998, STOC '98.

[38]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..