2006
DOI: 10.1016/j.comcom.2005.05.018
|View full text |Cite
|
Sign up to set email alerts
|

INSENS: Intrusion-tolerant routing for wireless sensor networks

Abstract: This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS constructs forwarding tables at each node to facilitate communication between sensor nodes and a base station. It minimizes computation, communication, storage, and bandwidth requirements at the sensor nodes at the expense of increased computation, communication, storage, and bandwidth requirements at the base station. INSENS does not rely on detecting intrusions, but rather tolerates intrusions by bypassi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
189
0
1

Year Published

2011
2011
2018
2018

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 213 publications
(190 citation statements)
references
References 28 publications
0
189
0
1
Order By: Relevance
“…The need to acknowledge every message might be a source of unnecessary energy expenditure. Message broadcasting without the need for guaranteeing reception at all nodes, such as in the case of beacons or specific messages (such as cryptographic keys as in [14]) broadcast by the base station to the whole network are also examples where asymmetric links can be used. Additionally, some authors have proposed eliminating ACKs in order to improve the performance of the network.…”
Section: Overhearing Cost and Asymmetric Linksmentioning
confidence: 99%
“…The need to acknowledge every message might be a source of unnecessary energy expenditure. Message broadcasting without the need for guaranteeing reception at all nodes, such as in the case of beacons or specific messages (such as cryptographic keys as in [14]) broadcast by the base station to the whole network are also examples where asymmetric links can be used. Additionally, some authors have proposed eliminating ACKs in order to improve the performance of the network.…”
Section: Overhearing Cost and Asymmetric Linksmentioning
confidence: 99%
“…The performance of the proposed scheme SEER is analyzed and compared with three existing protocol SEEM [22], ATSR [24] and INSENS [18] as in the following sub sections.…”
Section: Performance Analysismentioning
confidence: 99%
“…WSN introduces a combination of security threats to packet dropping, data altering and jamming. The capabilities of an adversary to eavesdrop, tamper with transmitted packets and inject packets to initiate denial-of-service (DOS) attack [7] have been enhanced due to the broadcast nature of the wireless communication medium [18]. The resource constraints limit the ability for sensor nodes to perform computation intensive public key cryptography such as RSA [1,16], though elliptic curve cryptography offers a promising course of research [11].…”
Section: Introductionmentioning
confidence: 99%
“…Deng et al [11] have designed an intrusion-tolerant routing protocol for sensor networks called INSENS which sends every data packet along multiple independent paths but requires feedback message to be send by each node to base station during route discovery phase introducing extra amount of overhead. S.B.…”
Section: B Alternate Path Schemementioning
confidence: 99%