2016
DOI: 10.3390/s16101606
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model

Abstract: Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in terms of security due to increased data transmission over the wireless channel with potentially unknown threats. Among possible security issues are timing attacks, which are not prevented by traditional cryptographic security. Moreover, the limited energy and memory re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 32 publications
(33 reference statements)
0
5
0
Order By: Relevance
“…It ranges from the analysis of service chains to arbitrary complex queues of huge network systems. It is usually used to analyze the probability distribution in a continuous-state space [44,45]. Several models of queuing systems are represented by Kendall's notation to classify system types and their queuing events.…”
Section: Queuing Theorymentioning
confidence: 99%
“…It ranges from the analysis of service chains to arbitrary complex queues of huge network systems. It is usually used to analyze the probability distribution in a continuous-state space [44,45]. Several models of queuing systems are represented by Kendall's notation to classify system types and their queuing events.…”
Section: Queuing Theorymentioning
confidence: 99%
“…This technique is generally used when the various performance metrics of WSNs are calculated. For example, these metrics include the effectiveness of battery recovery [ 39 ], characteristics of Rayleigh fading channels [ 40 ], the average number of successful transmissions completed by WSN nodes [ 41 ], and the effectiveness of protection against timing attacks [ 42 ]. Here, we consider the impact of a DoB attack, as well as the sensor battery capacity, on the system lifetime.…”
Section: Dob Analysismentioning
confidence: 99%
“…It is a commonly used survivability metric [ 42 , 44 ]. MTTF provides the mean time it takes for the sensor to reach the failure state for a given initial state of the sensor.…”
Section: Dob Analysismentioning
confidence: 99%
“…Hence, it also needs same computing with cluster members. Then, CHSD of one node will be calculated by Equations (5)- (7). This process actually need no data transmission except for the computing of CHSD.…”
Section: The Process Of Cluster Establishmentmentioning
confidence: 99%
“…In order to assist other nodes in the network to build information links, nodes can be used as router or terminal or both of them [3,4]. Mobile Ad hoc sensor network can be utilized in these scenarios, such as military and habitat monitoring [5,6], target tracking network [7,8]. For example, in the animal tracking system, sensor nodes are loaded on the body of animals in order to observing animal behavior.…”
Section: Introductionmentioning
confidence: 99%