Protecting the communication structure in sensor networks

dc.contributorVirginia Techen
dc.contributor.authorOlariu, S.en
dc.contributor.authorXu, Q.en
dc.contributor.authorEltoweissy, M.en
dc.contributor.authorWadaa, A.en
dc.contributor.authorZomaya, A. Y.en
dc.contributor.departmentComputer Scienceen
dc.date.accessed2014-06-11en
dc.date.accessioned2014-06-12T13:28:57Zen
dc.date.available2014-06-12T13:28:57Zen
dc.date.issued2005en
dc.description.abstractIn the near future wireless sensor networks will be employed in a wide variety of applications establishing ubiquitous networks that will pervade society. The inherent vulnerability of these massively deployed networks to a multitude of threats, including physical tampering with nodes exacerbates concerns about privacy and security. For example, denial of service attacks (DoS) that compromise or disrupt communications or target nodes serving key roles in the network, e.g. sink nodes, can easily undermine the functionality as well as the performance delivered by the network. Particularly vulnerable are the components of the communications or operation infrastructure. Although, by construction, most sensor network systems do not possess a built-in infrastructure, a virtual infrastructure, that may include a coordinate system, a cluster structure, and designated communication paths, may be established post-deployment in support of network management and operation. Since knowledge of this virtual infrastructure can be instrumental for successfully compromising network security, maintaining the anonymity of the virtual infrastructure is a primary security concern. Somewhat surprisingly, in spite of its importance, the anonymity problem has not been addressed in wireless sensor networks. The main contribution of this work is to propose an energy-efficient protocol for maintaining the anonymity of the virtual infrastructure in a class of sensor network systems. Our solution defines schemes for randomizing communications such that the cluster structure, and coordinate system used remain undetectable and in visible to an observer of network traffic during both the setup and operation phases of the network.en
dc.format.mimetypeapplication/pdfen
dc.identifier.citationS. Olariu, Q. Xu, M. Eltoweissy, A. Wadaa, and A. Y. Zomaya, "Protecting the Communication Structure in Sensor Networks," International Journal of Distributed Sensor Networks, vol. 1, no. 2, pp. 187-203, 2005. doi:10.1080/15501320590966440en
dc.identifier.doihttps://doi.org/10.1080/15501320590966440en
dc.identifier.issn1550-1329en
dc.identifier.urihttp://hdl.handle.net/10919/48913en
dc.identifier.urlhttp://www.hindawi.com/journals/ijdsn/2005/315051/cta/en
dc.language.isoen_USen
dc.publisherHindawi Publishing Corporationen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectWireless sensor networksen
dc.subjectEnergy-efficient protocolsen
dc.subjectScalableen
dc.subjectProtocolsen
dc.subjectTraffic anonymityen
dc.subjectAd hoc networksen
dc.subjectSecurityen
dc.subjectProtocolsen
dc.subjectComputer science, information systemsen
dc.subjectTelecommunicationsen
dc.titleProtecting the communication structure in sensor networksen
dc.title.serialInternational Journal of Distributed Sensor Networksen
dc.typeArticle - Refereeden
dc.typeConference proceedingen
dc.type.dcmitypeTexten
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
315051.pdf
Size:
1.65 MB
Format:
Adobe Portable Document Format
Description:
Main article