Loading...

Reuse-attack mitigation in wireless sensor networks

Shafiei, H ; Sharif University of Technology | 2011

544 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/icc.2011.5963399
  3. Publisher: 2011
  4. Abstract:
  5. Privacy preservation in wireless sensor networks has drawn considerable attention from research community during last few years. Emergence of single-owner, multi-user commercial sensor networks along with hostile and uncontrollable environment of such networks, makes the security issue in such networks of a great importance. This paper concentrates on token-based privacy preservation schemes. A possible attack on such schemes has been introduced. Two different approaches has been utilized to mitigate the attack. We present mathematical models for it's effects and overheads. The results have been verified using extensive simulations
  6. Keywords:
  7. Commercial sensors ; Extensive simulations ; Multi-user ; Privacy preservation ; Research communities ; Security issues ; Mathematical models ; Sensors ; Wireless sensor networks
  8. Source: IEEE International Conference on Communications, 5 June 2011 through 9 June 2011 ; June , 2011 , Page(s): 1 - 5 ; 05361486 (ISSN) ; 9781612842332 (ISBN)
  9. URL: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5963399