A performance evaluation of intrusion-tolerant routing in wireless sensor networks

Jing Deng, Richard Han, Shivakant Mishra

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

68 Citations (Scopus)

Abstract

This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefield monitoring and home security applications to prevent intruders from eavesdropping, from tampering with sensor data, and from launching denial-of-service (DOS) attacks against the entire network. The resilience of INSENS's multipath performance against various forms of communication-based attacks by intruders is evaluated in simulation. Within the context of INSENS, the paper evaluates implementations on the motes of the RC5 and AES encryption standards, an RC5-based scheme to generate message authentication codes (MACs), and an RC5-based generation of one-way sequence numbers.

Original languageEnglish
Title of host publicationInformation Processing in Sensor Networks
Subtitle of host publicationSecond International Workshop, IPSN 2003 Palo Alto, CA, USA, April 22-23, 2003 Proceedings
EditorsFeng Zhao, Leonidas Guibas
Place of PublicationBerlin, Germany
PublisherSpringer, Springer Nature
Pages349-364
Number of pages16
ISBN (Print)9783540021117
DOIs
Publication statusPublished - 2003
Externally publishedYes
Event2nd International Workshop on Information Processing in Sensor Networks, ISPN 2003 - Palo Alto, United States
Duration: 22 Apr 200323 Apr 2003

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2634
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Workshop on Information Processing in Sensor Networks, ISPN 2003
CountryUnited States
CityPalo Alto
Period22/04/0323/04/03

Fingerprint Dive into the research topics of 'A performance evaluation of intrusion-tolerant routing in wireless sensor networks'. Together they form a unique fingerprint.

Cite this