A study of Intrusion-tolerant routing in Wireless Sensor Networks
https://doi.org/10.15514/ISPRAS-2014-26(6)-9
Abstract
About the Authors
Vin Hoa LaRussian Federation
Ana Cavalli
Russian Federation
References
1. Libelium Comunicaciones Distribuidas S.L. “Waspmote Datasheet”, 2014
2. Akyildiz I, SuW, et al. “Wireless sensor networks: a survey”, in Computer Networks, pp. 393-422, 2002.
3. Ruiping Ma, Liudong Xing, Howard E. Michel. “Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks”, in 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 85- 94, 2006.
4. Liang-min Wang, Jian-feng Ma, Chao Wang, A.C. Kot. “Fault and intrusion tolerance of wireless sensor networks”, in 20th International Parallel and Distributed Processing Symposium, 2006.
5. Yves Deswarte, David Powell, “Intrusion-tolerance on the Internet (Tolrance aux intrusions sur Internet)”, in Presentation slide, LAAS- CNRS, Toulouse, France, 2005.
6. B.B. Madan and K.S. Trivedi, “Security modeling and quantification of intrusion tolerant systems”, in ISSRE, 2002.
7. Feiyi Wang, Raghavendra Uppalli, Charles Killian, “Analysis of tech- niques for building intrusion tolerant server systems”, in Military Communications Conference MILCOM ’03 IEEE, pp. 729 - 734 Vol.2, 2003.
8. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, “SPINS: Security Protocols for Sensor Networks”, in Journal of Wireless Networks, Volume 8, Issue 5, pp. 521- 534, Sept. 2002.
9. Chris karlof, Naveen Sastry, David Wagner. “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, in Proceedings of the 2nd international conference on Embedded networked sensor networks, pp. 162-175, 2004.
10. Soumya Basu, M.Pushpalatha. “Analysis of energy efficient ECC and TinySec based security schemes in Wireless Sensor Networks”, in IEEE International Conference on Advanced Networks and Telecommunication Systems (ANTS), pp. 1 - 6, 2013.
11. Ajay Mahimkar, Theodore S. Rappaport. “SecureDAV: a secure data aggregation and verification protocol for sensor networks”, in IEEE Global Telecommunications Conference (GLOBECOM), pp. 2175 – 2179, Vol.4, 2004.
12. Leonardo B. Oliveira, Hao Chi Wong, Antonio A. Loureiro. “LHA- SP: secure protocols for hierarchical wireless sensor networks”, in 9th IFIP/IEEE International Symposium on Integrated Network Manage- ment, pp. 31 - 44, 2005.
13. D. Estrin, R. Govindan, J. S. Heidemann, and S. Kumar. “Next century challenges: Scalable coordination in sensor networks ”, in Mobile Computing and Networking , pp. 263 – 270, 1999.
14. Maha Sliti, Mohamed Hamdi, Noureddine Boudriga. “Intrusion-tolerant framework for heterogeneous Wireless Sensor Networks”, in The 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, pp. 633- 636, May 10-13, 2009.
15. J. Deng, R. Han, and S. Mishra. “INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks”, Poster paper in 23rd IEEE International Conference on Distributed Computing Systems, 2003
16. J. Deng, R. Han, and S. Mishra. “INSENS: Secure and Intrusion Tolerant Routing for Wireless Sensor Networks”, Technical Report CU-CS 939-02. Department of Computer Science. University of Colorado, Boulder, CO. November 2002.
17. J. Deng, R. Han, and S. Mishra. “A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks”, in 2nd IEEE International Workshop on Information Processing in Sensor Networks, 2003
18. Sapon Tanachaiwiwat, Pinalkumar Dave, Rohan Bhindwale, Ahmed Helmy. “Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-Aware Sensor Networks”, in SenSys’08, Los Angeles, California, USA, ACM 1-58813-707-9/03/0011, 2008
19. Jiliang Zhou, Caixia Li , Qiying Cao and Yu Shen, “An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network”, in International Conference on Information and Automation-ICIA 2008, pp. 1547 - 1552, 2008.
20. L.M. Feeney. “An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks”, in Mobile Networks and Applications, pp. 239 - 249, 2001.
Review
For citations:
La V.H., Cavalli A. A study of Intrusion-tolerant routing in Wireless Sensor Networks. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2014;26(6):99-110. (In Russ.) https://doi.org/10.15514/ISPRAS-2014-26(6)-9