Intrusion-tolerant framework for heterogeneous Wireless Sensor Networks

Attacks against Wireless Sensor Networks (WSNs) are becoming more and more frequent. Due to the sensitive nature of these networks, appropriate security mechanisms should therefore be developed. This paper introduces a fault-tolerant approach for WSNs. The basic idea to detect malicious nodes is to proceed to intermediate verification of the signed messages within the communication paths. A tolerance state is defined in which a set of tests are performed on the malicious node in order to definitely reject it or rehabilitate it.

[1]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[2]  Dan Boneh,et al.  Building intrusion tolerant applications , 1999, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[3]  Xiuzhen Cheng,et al.  Localized fault-tolerant event boundary detection in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[4]  David E. Bakken,et al.  Developing a heterogeneous intrusion tolerant CORBA system , 2002, Proceedings International Conference on Dependable Systems and Networks.

[5]  Xiuzhen Cheng,et al.  Fault tolerant event boundary detection and target tracking in sensor networks , 2008 .

[6]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .

[7]  William H. Sanders,et al.  Quantifying the cost of providing intrusion tolerance in group communication systems , 2002, Proceedings International Conference on Dependable Systems and Networks.

[8]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[9]  Mohamed Hamdi,et al.  An elliptic threshold signature framework for k-security in wireless sensor networks , 2008, 2008 15th IEEE International Conference on Electronics, Circuits and Systems.

[10]  Mohammad S. Obaidat,et al.  Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking , 2008, IEEE Systems Journal.

[11]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[12]  Jessica Staddon,et al.  Efficient tracing of failed nodes in sensor networks , 2002, WSNA '02.

[13]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[14]  Mohammad S. Obaidat,et al.  WHOMoVeS: An optimized broadband sensor network for military vehicle tracking , 2008, Int. J. Commun. Syst..

[15]  Christian Cachin,et al.  Secure INtrusion-Tolerant Replication on the Internet , 2002, Proceedings International Conference on Dependable Systems and Networks.

[16]  Ahmed Helmy,et al.  Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks , 2003, SenSys '03.