Sciweavers

Share
DCOSS
2006
Springer

Locating Compromised Sensor Nodes Through Incremental Hashing Authentication

9 years 3 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a COmpromised nOde Locating protocol for detecting and locating compromised nodes once they misbehave in the sensor network. We exploit a proven collision-resilient incremental hashing algorithm and design secure steps to confidently locate compromised nodes. The scheme can also be combined with existing en-route false report filtering schemes to achieve both early false report dropping and accurate compromised nodes isolation.
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia
Added 22 Aug 2010
Updated 22 Aug 2010
Type Conference
Year 2006
Where DCOSS
Authors Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia Li
Comments (0)
books