Abstract
Sensor webs consisting of nodes with limited battery power and wireless communication are deployed to collect useful information from a variety of environments. A new challenge in the wireless sensor networks (WSN) is the compromised nodes problem. Compromised nodes may exhibit arbitrary behavior and may collude with other compromised nodes. In this paper, we propose a novel security strategy with assistant cluster heads, SSACH, which focuses on limiting the attack from compromised nodes. It adds the Assistant Cluster Heads (ACH) so as to monitor Cluster Head (CH) and take precautions against the inside attack.
This paper is supported by the National Natural Science Foundation of China under Grant No. 60241004 ,the National Grand Fundamental Research 973 Program of China under Grant No. 2003CB314801, and the State Key Laboratory of Networking and Switching Technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. Computer 36(10), 103–105 (2003)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: Proceedings, IEEE Symposium Security and Privacy, pp. 259–271 (2004)
Shi, E., Perrig, A.: Designing secure sensor networks. In: Wireless Communications, vol. 11(6), pp. 38–43. IEEE, Los Alamitos (2004)
Ren, Q., Liang, Q.: Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures. In: Personal, Indoor and Mobile Radio Communications, PIMRC 2004, 15th IEEE International Symposium, vol. 4, pp. 3025–3029 (2004)
Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.B.: Secure Aggregation for Wireless Networks. In: Proceedings 11th IEEE International Workshops, Enabling Technologies, Infrastructure for Collaborative Enterprises, WET ICE 2002, pp. 139–144 (2002)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. of Embedded Networked Sensor Sys., pp. 255–265 (2003)
Blom, R.: An Optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Blundo, C., Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security, CCS 2003 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of the 10th ACM conference on Computer and communications security, pp. 42–51 (2003)
Di Pietro, R., Mancini, L.V., Mei, A.: Efficient and resilient key discovery based on pseudo-random key pre-deployment. In: Proceedings of Parallel and Distributed Processing Symposium, p. 217 (2004)
Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.B.: On communication security in wireless ad-hoc sensor networks. Enabling Technologies: Infrastructure for Collaborative Enterprises. In: WET ICE 2002, Proceedings. Eleventh IEEE International Workshops, pp. 139–144 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, ZT., Qu, YG., Jing, L., Zhao, BH. (2006). Compromised Nodes in Wireless Sensor Network. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds) Advanced Web and Network Technologies, and Applications. APWeb 2006. Lecture Notes in Computer Science, vol 3842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610496_28
Download citation
DOI: https://doi.org/10.1007/11610496_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31158-4
Online ISBN: 978-3-540-32435-5
eBook Packages: Computer ScienceComputer Science (R0)