메뉴 건너뛰기




Volumn 35, Issue 2, 2012, Pages 234-248

A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis

Author keywords

Resilience; Selective forwarding and sinkhole attacks; Tree based routing protocols; Wireless sensor network

Indexed keywords

COMPUTATIONAL COSTS; MALICIOUS ATTACK; MALICIOUS NODES; NETWORK SCALE; NOVEL DESIGN; RESILIENCE; ROUTING TOPOLOGY; SECURITY ANALYSIS; SELECTIVE FORWARDING; SELECTIVE-FORWARDING AND SINKHOLE ATTACKS; SIMULATION STUDIES; TREE-BASED ROUTING; WIRELESS SENSOR;

EID: 82955163119     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2011.09.005     Document Type: Article
Times cited : (23)

References (53)
  • 2
    • 0012578438 scopus 로고    scopus 로고
    • Gradient broadcast: A robust, long-live large sensor network
    • UCLA
    • F. Ye, A. Chen, S. Lu, L. Zhang, Gradient broadcast: a robust, long-live large sensor network, Technical report, UCLA, 2001.
    • (2001) Technical Report
    • Ye, F.1    Chen, A.2    Lu, S.3    Zhang, L.4
  • 4
    • 1542347691 scopus 로고    scopus 로고
    • Power-efficient data dissemination in wireless sensor networks
    • San Diego, CA, USA
    • U. Cetintemel, A. Flinders, Y. Sun, Power-efficient data dissemination in wireless sensor networks, in: ACM MobiDE, San Diego, CA, USA, 2003.
    • (2003) ACM MobiDE
    • Cetintemel, U.1    Flinders, A.2    Sun, Y.3
  • 5
    • 84994296501 scopus 로고    scopus 로고
    • The impact of data aggregation in wireless sensor networks
    • Washington, DC, USA
    • B. Krishnamachari, D. Estrin, S. Wicker, The impact of data aggregation in wireless sensor networks, in: IEEE ICDCS, Washington, DC, USA, 2002, pp. 575-578.
    • (2002) IEEE ICDCS , pp. 575-578
    • Krishnamachari, B.1    Estrin, D.2    Wicker, S.3
  • 6
    • 0003234376 scopus 로고    scopus 로고
    • Residual energy scans for monitoring wireless sensor networks
    • Y.J. Zhao, R. Govindan, D. Estrin, Residual energy scans for monitoring wireless sensor networks, in: IEEE WCNC, 2002.
    • (2002) IEEE WCNC
    • Zhao, Y.J.1    Govindan, R.2    Estrin, D.3
  • 7
    • 84978428047 scopus 로고    scopus 로고
    • TAG: A tiny aggregation service for ad-hoc sensor networks
    • S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong TAG: a tiny aggregation service for ad-hoc sensor networks ACM OSR 2002 131 146
    • (2002) ACM OSR , pp. 131-146
    • Madden, S.1    Franklin, M.J.2    Hellerstein, J.M.3    Hong, W.4
  • 9
    • 82955234795 scopus 로고    scopus 로고
    • Malicious node detection in wireless sensor networks
    • Miami, Florida, USA
    • W.R.P. Junior, T.H. de P. Figueiredo, H.C. Wong, Malicious node detection in wireless sensor networks, in: IEEE IPDPS, Miami, Florida, USA, 2004.
    • (2004) IEEE IPDPS
    • Junior, W.R.P.1    Figueiredo De, T.P.H.2    Wong, H.C.3
  • 10
    • 79958699057 scopus 로고    scopus 로고
    • Detecting malicious sensor nodes from learned data patterns
    • Honolulu, Hawaii
    • P. Mukherjee, S. Sen, Detecting malicious sensor nodes from learned data patterns, in: Agent Technology for Sensor Networks, Honolulu, Hawaii, 2007.
    • (2007) Agent Technology for Sensor Networks
    • Mukherjee, P.1    Sen, S.2
  • 11
    • 74549177934 scopus 로고    scopus 로고
    • Using learned data patterns to detect malicious nodes in sensor networks
    • Kolkata, India
    • P. Mukherjee, S. Sen, Using learned data patterns to detect malicious nodes in sensor networks, in: ICDCN, Kolkata, India, 2008.
    • (2008) ICDCN
    • Mukherjee, P.1    Sen, S.2
  • 12
    • 77950998038 scopus 로고    scopus 로고
    • Detecting selective forwarding attacks in wireless sensor networks
    • Rhodes Island, Greece
    • B. Yu, B. Xao, Detecting selective forwarding attacks in wireless sensor networks, in: IEEE IPDPS, Rhodes Island, Greece, 2006.
    • (2006) IEEE IPDPS
    • Yu, B.1    Xao, B.2
  • 15
    • 33751183522 scopus 로고    scopus 로고
    • A secure alternate path routing in sensor networks
    • Elsevier
    • S.-B. Lee, and Y.-H. Choi A secure alternate path routing in sensor networks Computer Communications vol. 30 2006 Elsevier 153 165
    • (2006) Computer Communications , vol.30 , pp. 153-165
    • Lee, S.-B.1    Choi, Y.-H.2
  • 17
    • 47749148120 scopus 로고    scopus 로고
    • RaWMS - Random walk based lightweight membership service for wireless ad hoc networks
    • Z. Bar-Yossef, R. Friedman, and G. Kliot RaWMS - Random walk based lightweight membership service for wireless ad hoc networks ACM Transactions on Computer Systems (TOCS) 26 2 2008 1 66
    • (2008) ACM Transactions on Computer Systems (TOCS) , vol.26 , Issue.2 , pp. 1-66
    • Bar-Yossef, Z.1    Friedman, R.2    Kliot, G.3
  • 26
    • 33646834914 scopus 로고    scopus 로고
    • A new approach for random key pre-distribution in large-scale wireless sensor networks
    • DOI 10.1002/wcm.397
    • K. Ren, K. Zeng, and W. Lou A new approach for random key predistribution in large scale wireless sensor networks Journal of Wireless Communication and Mobile Computing 6 2006 307 318 (Pubitemid 43774310)
    • (2006) Wireless Communications and Mobile Computing , vol.6 , Issue.3 , pp. 307-318
    • Ren, K.1    Zeng, K.2    Lou, W.3
  • 27
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • W. Du, J. Deng, Y. Han, S. Chen, P. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, in: IEEE Infocom, 2004.
    • (2004) IEEE Infocom
    • Du, W.1    Deng, J.2    Han, Y.3    Chen, S.4    Varshney, P.5
  • 28
    • 24944537172 scopus 로고    scopus 로고
    • Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
    • S. Zhu, S. Xu, S. Setia, S. Jajodia, Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach, in: IEEE ICNP, 2003.
    • (2003) IEEE ICNP
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4
  • 29
    • 41449098948 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • DOI 10.1109/TMC.2007.70753, 4358997
    • K. Ren, W. Lou, and Y. Zhang Leds: providing location-aware end-to-end data security in wireless sensor networks IEEE Transactions on Mobile Computing (TMC) 7 5 2008 585 598 (Pubitemid 351454006)
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.5 , pp. 585-598
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 30
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • DOI 10.1109/JSAC.2005.861382
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang Location based compromise-tolerant security mechanisms in wireless sensor networks IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks 24 2 2006 247 260 (Pubitemid 43269747)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 31
  • 33
    • 74549128448 scopus 로고    scopus 로고
    • Insens: Intrusion-tolerant routing in wireless sensor networks
    • Providence, Rhodes Island, USA
    • S.M. Jing Deng, Richard Han, Insens: intrusion-tolerant routing in wireless sensor networks, in: IEEE ICDCS, Providence, Rhodes Island, USA, 2003.
    • (2003) IEEE ICDCS
    • Jing Deng, S.M.1    Han, R.2
  • 36
    • 74549134905 scopus 로고    scopus 로고
    • A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    • Barcelona, Spain
    • Y. Sun, Z. Han, W. Yu, K.J.R. Liu, A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks, in: IEEE INFOCOM, Barcelona, Spain, 2007.
    • (2007) IEEE INFOCOM
    • Sun, Y.1    Han, Z.2    Yu, W.3    Liu, K.J.R.4
  • 39
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • Springer
    • R. Poovendran, and L. Lazos A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks Wireless Network vol. 13 2007 Springer pp. 108-114
    • (2007) Wireless Network , vol.13 , pp. 108-114
    • Poovendran, R.1    Lazos, L.2
  • 41
    • 64449088975 scopus 로고    scopus 로고
    • Serwa: A secure routing protocol against wormhole attacks in sensor networks
    • S. Madria, and J. Yin Serwa: a secure routing protocol against wormhole attacks in sensor networks Ad Hoc Network 7 2009 1051 1063
    • (2009) Ad Hoc Network , vol.7 , pp. 1051-1063
    • Madria, S.1    Yin, J.2
  • 42
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • DOI 10.1007/s11276-006-3723-x
    • R. Poovendran, and L. Lazos A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks Wireless Network 13 2007 27 59 (Pubitemid 46034258)
    • (2007) Wireless Networks , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 43
    • 4544259841 scopus 로고    scopus 로고
    • Sector: Secure tracking of node encounters in multi-hop wireless networks
    • S. Čapkun, L. Buttyán, J.-P. Hubaux, Sector: secure tracking of node encounters in multi-hop wireless networks, in: ACM workshop on Security of ad hoc and sensor networks, 2003, pp. 21-32.
    • (2003) ACM Workshop on Security of Ad Hoc and Sensor Networks , pp. 21-32
    • Čapkun, S.1
  • 44
    • 37849022826 scopus 로고    scopus 로고
    • Applicability of public key infrastructures in wireless sensor networks
    • Springer
    • R. Roman, and C. Alcaraz Applicability of public key infrastructures in wireless sensor networks Proceedings of the 4th EuroPKI Workshop 2007 Springer 313 320
    • (2007) Proceedings of the 4th EuroPKI Workshop , pp. 313-320
    • Roman, R.1    Alcaraz, C.2
  • 47
    • 84957812088 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • Springer-Verlag London, UK
    • A.K. Lenstra, and E.R. Verheul Selecting cryptographic key sizes PKC 2000 Springer-Verlag London, UK 446 465
    • (2000) PKC , pp. 446-465
    • Lenstra, A.K.1    Verheul, E.R.2
  • 48
    • 74249113564 scopus 로고    scopus 로고
    • IOS Press (Chapter L. Batina et al. Chapter Public-key Primitives)
    • J. Lopez, and J. Zhou Wireless Sensor Network Security 2008 IOS Press (Chapter L. Batina et al. Chapter Public-key Primitives)
    • (2008) Wireless Sensor Network Security
    • Lopez, J.1    Zhou, J.2
  • 49
    • 35348832896 scopus 로고    scopus 로고
    • A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes
    • DOI 10.1007/s11036-007-0024-2, Special Issue on Next Generation Hardware Architectures for Secure Mobile Computing. Guest Editors: Maire O'Neill, Xinmiao Zhang, Nicolas Sklavos
    • R. Roman, C. Alcaraz, and J. Lopez A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes Mobile Networks Application 12 4 2007 231 244 (Pubitemid 47574435)
    • (2007) Mobile Networks and Applications , vol.12 , Issue.4 , pp. 231-244
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3
  • 50
    • 33745269795 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • DOI 10.1145/1138127.1138130
    • Y.W. Law, J. Doumen, and P. Hartel Survey and benchmark of block ciphers for wireless sensor networks ACM Transactions on Sensor Networks. 2 1 2006 65 93 (Pubitemid 43925113)
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.1 , pp. 65-93
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3
  • 51
    • 37149007406 scopus 로고    scopus 로고
    • Survey and benchmark of stream ciphers for wireless sensor networks
    • Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Proceedings
    • N. Fournel, M. Minier, and S. Ubéda Survey and benchmark of stream ciphers for wireless sensor networks Proceedings of the Workshop on Information Security Theory and Practice Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems Lecture Notes in Computer Science vol. 4462 2007 Springer Berlin/ Heidelberg 202 214 (Pubitemid 350259651)
    • (2007) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , vol.LNCS 4462 , pp. 202-214
    • Fournel, N.1    Minier, M.2    Ubeda, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.