z-logo
open-access-imgOpen Access
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Author(s) -
Youtao Zhang,
Jun Yang,
Lingling Jin,
Weijia Li
Publication year - 2006
Publication title -
lecture notes in computer science
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.249
H-Index - 400
eISSN - 1611-3349
pISSN - 0302-9743
ISBN - 3-540-35227-9
DOI - 10.1007/11776178_20
Subject(s) - computer science , hash function , exploit , wireless sensor network , node (physics) , computer network , authentication (law) , protocol (science) , scheme (mathematics) , message authentication code , isolation (microbiology) , computer security , cryptography , medicine , mathematical analysis , alternative medicine , mathematics , structural engineering , pathology , engineering , microbiology and biotechnology , biology
While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a COmpromised nOde Locating protocol for detecting and locating compromised nodes once they misbehave in the sensor network. We exploit a proven collision-resilient incremental hashing algorithm and design secure steps to confidently locate compromised nodes. The scheme can also be combined with existing en-route false report filtering schemes to achieve both early false report dropping and accurate compromised nodes isolation.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom