Deakin University
Browse

File(s) under permanent embargo

Fast recovery from node compromise in wireless sensor networks

conference contribution
posted on 2009-01-01, 00:00 authored by Bai Li, Robin Ram Mohan DossRobin Ram Mohan Doss, Lynn BattenLynn Batten, W Schott
Wireless Sensor Networks (WSNs) are susceptible to a wide range of security attacks in hostile environments due to the limited processing and energy capabilities of sensor nodes. Consequently, the use of WSNs in mission critical applications requires reliable detection and fast recovery from these attacks. While much research has been devoted to detecting security attacks, very little attention has been paid yet to the recovery task. In this paper, we present a novel mechanism that is based on dynamic network reclustering and node reprogramming for recovering from node compromise. In response to node compromise, the proposed recovery approach reclusters the network excluding compromised nodes; thus allowing normal network operation while initiating node recovery procedures. We propose a novel reclustering algorithm that uses 2-hop neighbourhood information for this purpose. For node reprogramming we propose the modified Deluge protocol. The proposed node recovery mechanism is both decentralized and scalable. Moreover, we demonstrate through its implementation on a TelosB-based sensor network testbed that the proposed recovery method performs well in a low-resource WSN.

History

Event

International Conference on New Technologies, Mobility and Security (3rd : 2009 : Cairo, Egypt)

Pagination

1 - 6

Publisher

IEEE

Location

Cairo, Egypt

Place of publication

Piscataway, N. J.

Start date

2009-12-20

End date

2009-12-23

ISBN-13

9781424462735

Language

eng

Notes

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Publication classification

E1 Full written paper - refereed

Copyright notice

2009, IEEE

Editor/Contributor(s)

K Al-Agha, M Badra, G Newby

Title of proceedings

NTMS 2009 : Proceedings of the NTMS 2009 3rd International Conference on New Technologies, Mobility and Security

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC