Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks 2006
DOI: 10.1145/1180345.1180359
|View full text |Cite
|
Sign up to set email alerts
|

Diversify sensor nodes to improve resilience against node compromise

Abstract: A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys) from the node. In most of the key pre-distribution schemes, the compromise of secret information on one node can have substantial impact on other nodes because secrets are shared by more than one node in those schemes. Although tamper-resistant hardware can help protect those secrets, it is still impractical for sensor networks.Havin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(25 citation statements)
references
References 30 publications
0
25
0
Order By: Relevance
“…Node compromise in sensor networks and the need for their security has also received immense attention [Alarifi and Du 2006]. A large portion of current research on security in sensor networks has been focused on protocols and schemes for securing the communication between nodes [Liu and Ning 2003;Eschenauer and Gligor 2002;Malan et al 2004].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Node compromise in sensor networks and the need for their security has also received immense attention [Alarifi and Du 2006]. A large portion of current research on security in sensor networks has been focused on protocols and schemes for securing the communication between nodes [Liu and Ning 2003;Eschenauer and Gligor 2002;Malan et al 2004].…”
Section: Related Workmentioning
confidence: 99%
“…In [Alarifi and Du 2006], the authors assert the importance of physical compromise of sensor nodes and propose an obfuscation and diversification mechanism to protect the secret keys of the nodes. Unfortunately, little work has been done on the defense strategies when the compromise of a single node could be used to compromise other nodes over the air.…”
Section: Related Workmentioning
confidence: 99%
“…In [5], a code obfuscation mechanism for WSNs is proposed to improve the resilience to node compromise. The goal is a diversified key protection scheme for WSNs that diversifies data and code segments by creating different and obfuscated data and code segments for each sensor node in the network.…”
Section: Related Workmentioning
confidence: 99%
“…Code Obfuscation: Code obfuscation is a process that has been studied well previously [5,15,30] and it can be described as follows. Suppose that (part of) an algorithm consists of a loop where the execution of a given set of instructions depends on certain input values.…”
Section: Obfuscationmentioning
confidence: 99%