作者
Wensheng Zhang, Guohong Cao
发表日期
2005/3/13
研讨会论文
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
卷号
1
页码范围
503-514
出版商
IEEE
简介
When a sensor network is deployed in hostile environments, the adversary may compromise some sensor nodes, and use the compromised nodes to inject false sensing reports or modify the reports sent by other nodes. In order to defend against the attacks with low cost, researchers have proposed symmetric group key-based en-route filtering schemes, such as SEF [F. Ye et al., March 2004] and I-LHAP [S. Zhu et al., 2004]. However, if the adversary has compromised a large number of nodes, many group keys can be captured, and the filtering schemes may become ineffective or even useless. To deal with node compromise, the compromised nodes should be identified and the innocent nodes should update their group keys. Some existing intruder identification schemes can be used to identify the compromised nodes, but most existing group rekeying schemes are not suitable for sensor networks since they have …
引用总数
2004200520062007200820092010201120122013201420152016201720182019202020212022202318293633232919131615659461211