DOI: 10.1007/978-3-540-73275-4_15
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
50
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(50 citation statements)
references
References 6 publications
0
50
0
Order By: Relevance
“…In a cluster-based WSN, each cluster head can be equipped with a TPM for the purpose of remote attestation. However, the TPM-based scheme 10 incurs a considerable storage overhead to the cluster heads because several hash values must be reserved.…”
Section: Introductionmentioning
confidence: 99%
“…In a cluster-based WSN, each cluster head can be equipped with a TPM for the purpose of remote attestation. However, the TPM-based scheme 10 incurs a considerable storage overhead to the cluster heads because several hash values must be reserved.…”
Section: Introductionmentioning
confidence: 99%
“…Integrity of nodes may for example be verified by an attestation protocol, which uses a trusted platform module (TPM) to attest the integrity of cluster heads [1]. But in order to enable a WSN-operator to react to tampering attempts, information about node integrity needs to be exchanged throughout the network.…”
Section: Introductionmentioning
confidence: 99%
“…Detecting and defending against attacks are important tasks of security mechanisms. To review easily, we summarize current related research works [11,[15][16][17][18][19][20][21][22][23][24] as attack detecting mechanisms, and node compromise detecting mechanisms.…”
Section: Attack Detectingmentioning
confidence: 99%
“…Some hardware-based approaches such as [23] are based on public-key cryptography and require extensive computational power, as well as the transmission of large messages, making these approaches not usable in WSNs. Krauss et al [24] supposed that some cluster nodes possed much more resources than the majority of clusters and were equipped with a All of above mechanisms can be adapted to check whether the given node has been compromised under their assumptions, though sometimes their assumptions are very strong. For example, [22] assumed that the attacker's hardware devices were not present in the sensor network for the duration of the repair process.…”
Section: Node Compromise Detecting Mechanismsmentioning
confidence: 99%
See 1 more Smart Citation