Abstract
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
Supplemental Material
Available for Download
Requires Asian Language Support in Adobe Reader and Japanese Language Support in Your Browser
- Adamy, D. EW 101: A First Course in Electronic Warfare. Artech House Publishers, Norwood, MA, 2001.Google Scholar
- Deng, J., Han, R., and Mishra, S. A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In Proceedings of the 2nd IEEE International Workshop on Information Processing in Sensor Networks (IPSN 2003) (Apr. 2003), 349--364. Google ScholarDigital Library
- Eschenauer, L. and Gligor, V. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security (Washington, D.C., Nov.). ACM Press, New York, 2002, 41--47. Google ScholarDigital Library
- Hu, Y.-C., Perrig, A., and Johnson, D. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of IEEE Infocom 2003 (San Francisco, Apr. 1--3, 2003).Google ScholarCross Ref
- Karlof, C. and Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (Anchorage, AK, May 11, 2003).Google ScholarCross Ref
- Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. SPINS: Security protocols for sensor networks. J. Wireless Nets. 8, 5 (Sept. 2002), 521--534. Google ScholarDigital Library
- Przydatek, B., Song, D., and Perrig, A. SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems (SenSys 2003) (Los Angeles, Nov. 5--7). ACM Press, New York, 2003, 255--265. Google ScholarDigital Library
- Wood, A., Stankovic, J., and Son, S. JAM: A mapping service for jammed regions in sensor networks. In Proceedings of the IEEE Real-Time Systems Symposium (Cancun, Mexico, Dec. 3--5, 2003).Google Scholar
- Wood, A. and Stankovic, J. Denial of service in sensor networks. IEEE Comput. (Oct. 2002), 54--62. Google ScholarDigital Library
Index Terms
- Security in wireless sensor networks
Recommendations
Toward resilient security in wireless sensor networks
MobiHoc '05: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computingNode compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised nodes; the security protection completely breaks down when the threshold ...
Comments