mirage

A randomized countermeasure against parasitic adversaries in wireless sensor networks.

DSpace/Manakin Repository

 

Search DR-NTU


Advanced Search Subject Search

Browse

My Account

A randomized countermeasure against parasitic adversaries in wireless sensor networks.

Show full item record

Title: A randomized countermeasure against parasitic adversaries in wireless sensor networks.
Author: Luo, Jun.; Panagiotis Papadimitratos.; Hubaux, Jean-Pierre.
Copyright year: 2010
Abstract: Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, called parasitic adversary, who seeks to exploit sensor networks by obtaining measurements in an unauthorized way. As a countermeasure, we first employ a randomized key refreshing: with low communication cost, it aims at confining (but not eliminating) the effects of the adversary. Moreover, our low-complexity solution, GossiCrypt, leverages on the large scale of sensor networks to protect data confidentiality, efficiently and effectively. GossiCrypt applies symmetric key encryption to data at their source nodes; and it applies re-encryption at a randomly chosen subset of nodes en route to the sink. The combination of randomized key refreshing and GossiCrypt protects data confidentiality with a probability of almost 1; we show this analytically and with simulations. In addition, the energy consumption of GossiCrypt is lower than a public-key based solution by several orders of magnitude.
Subject: DRNTU::Engineering::Electrical and electronic engineering::Wireless communication systems.
Type: Journal Article
Series/ Journal Title: IEEE Journal on selected areas in communications
School: School of Computer Engineering
Rights: © 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. http://www.ieee.org/portal/site This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Version: Published version

Files in this item

Files Size Format View
GCrypt.pdf 392.2Kb PDF View/Open
   

DOI Query

- Get published version (via Digital Object Identifier)
   

This item appears in the following Collection(s)

Show full item record

Statistics

Total views

All Items Views
A randomized countermeasure against parasitic adversaries in wireless sensor networks. 413

Total downloads

All Bitstreams Views
GCrypt.pdf 194

Top country downloads

Country Code Views
United States of America 59
China 43
Singapore 42
Russian Federation 14
India 7

Top city downloads

city Views
Singapore 42
Mountain View 38
Beijing 33
Redwood City 5
Johor Bahru 4

Downloads / month

  2014-02 2014-03 2014-04 total
GCrypt.pdf 0 0 2 2