Title | ||
---|---|---|
Secret-Sharing Approach for Detecting Compromised Mobile Sink in Unattended Wireless Sensor Networks. |
Abstract | ||
---|---|---|
In unattended wireless sensor networks (UWSNs), static sensor nodes monitor environment, store sensing data in memory temporally. Mobile sink patrols and collects the sensors’ data itinerantly. Mobile sink is granted with more permissions than static sensor nodes, rendering it more attractive to the adversary. By compromising the mobile sinks, the adversary can not only seek the sensing data, but it also can steel all kinds of keys and access permissions, which may be abused to undermine other benign sensor nodes, even worse to upset the whole network. Currently, many related works focus on key management, permission management to restrict the compromised mobile sink or authentication to guarantee data reliability. However, the issue of compromised mobile sinks attracts little attention, and gradually become one obstacle to the application of UWSNs. |
Year | Venue | Field |
---|---|---|
2017 | MSN | Key management,Permission,Obstacle,Secret sharing,Authentication,Computer science,Computer network,Adversary,Rendering (computer graphics),Wireless sensor network |
DocType | Citations | PageRank |
Conference | 0 | 0.34 |
References | Authors | |
17 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xiangyi Chen | 1 | 0 | 0.34 |
Liangmin Wang | 2 | 159 | 10.11 |