iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://unpaywall.org/10.1007/11610496_28
Compromised Nodes in Wireless Sensor Network | SpringerLink
Skip to main content

Compromised Nodes in Wireless Sensor Network

  • Conference paper
Advanced Web and Network Technologies, and Applications (APWeb 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3842))

Included in the following conference series:

Abstract

Sensor webs consisting of nodes with limited battery power and wireless communication are deployed to collect useful information from a variety of environments. A new challenge in the wireless sensor networks (WSN) is the compromised nodes problem. Compromised nodes may exhibit arbitrary behavior and may collude with other compromised nodes. In this paper, we propose a novel security strategy with assistant cluster heads, SSACH, which focuses on limiting the attack from compromised nodes. It adds the Assistant Cluster Heads (ACH) so as to monitor Cluster Head (CH) and take precautions against the inside attack.

This paper is supported by the National Natural Science Foundation of China under Grant No. 60241004 ,the National Grand Fundamental Research 973 Program of China under Grant No. 2003CB314801, and the State Key Laboratory of Networking and Switching Technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. Computer 36(10), 103–105 (2003)

    Article  Google Scholar 

  2. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: Proceedings, IEEE Symposium Security and Privacy, pp. 259–271 (2004)

    Google Scholar 

  3. Shi, E., Perrig, A.: Designing secure sensor networks. In: Wireless Communications, vol. 11(6), pp. 38–43. IEEE, Los Alamitos (2004)

    Google Scholar 

  4. Ren, Q., Liang, Q.: Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures. In: Personal, Indoor and Mobile Radio Communications, PIMRC 2004, 15th IEEE International Symposium, vol. 4, pp. 3025–3029 (2004)

    Google Scholar 

  5. Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.B.: Secure Aggregation for Wireless Networks. In: Proceedings 11th IEEE International Workshops, Enabling Technologies, Infrastructure for Collaborative Enterprises, WET ICE 2002, pp. 139–144 (2002)

    Google Scholar 

  6. Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. of Embedded Networked Sensor Sys., pp. 255–265 (2003)

    Google Scholar 

  7. Blom, R.: An Optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  8. Blundo, C., Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Google Scholar 

  9. Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security, CCS 2003 (2003)

    Google Scholar 

  10. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of the 10th ACM conference on Computer and communications security, pp. 42–51 (2003)

    Google Scholar 

  11. Di Pietro, R., Mancini, L.V., Mei, A.: Efficient and resilient key discovery based on pseudo-random key pre-deployment. In: Proceedings of Parallel and Distributed Processing Symposium, p. 217 (2004)

    Google Scholar 

  12. Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.B.: On communication security in wireless ad-hoc sensor networks. Enabling Technologies: Infrastructure for Collaborative Enterprises. In: WET ICE 2002, Proceedings. Eleventh IEEE International Workshops, pp. 139–144 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, ZT., Qu, YG., Jing, L., Zhao, BH. (2006). Compromised Nodes in Wireless Sensor Network. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds) Advanced Web and Network Technologies, and Applications. APWeb 2006. Lecture Notes in Computer Science, vol 3842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610496_28

Download citation

  • DOI: https://doi.org/10.1007/11610496_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31158-4

  • Online ISBN: 978-3-540-32435-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics