Abstract
A large-scale wireless sensor network relies on broadcast protocol for data communication. This paper presents an idea for a base station to reliably and securely broadcast announcing messages to the network in an intrusion-tolerant way. Our Intrusion-Tolerant Broadcast Protocol based on Mutual Verification scheme guarantees that no forged information can be propagated to the network if an intruder is assumed to not compromise the base station. We show that our proposed protocol successfully runs and also demonstrate the effectiveness of the protocol by introducing a theorem and the proof of the theorem.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Lee, Y.H., Deshmukh, A., Phadke, V., Lee, J.W.: Key Management in Wireless Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 190–204. Springer, Heidelberg (2005)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient and secure source authentication for multicast. In: Network and Distributed System Security Symposium (NDSS 2001) (2001)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal (WINET) 8(5), 521–534 (2002)
Clementi, A.E.F., Monti, A., Silvestri, R.: 802.11 Specification. In: ACM-SIAM SODA 2001 (2001)
Liu, D., Ning, P.: Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks. In: Proc. of the 10th Annual Network and Distributed System Security Symposium, pp. 263–276 (2003)
Chakrabarti, A., Sabharwal, A., Aazhang, B.: Multi-Hop Communication is Order-Optimal for Homogeneous Sensor Networks. In: Proceedings of the third international symposium on Information processing in Sensor Networks, pp. 178–185 (2004)
Kohl, J., Neuman, C.: The Kerberos Network Authentication Service (V5), in RFC 1510 (1993)
Shnayder, V., Hempstead, M., Chen, B.-R., Welsh, M.: PowerTOSSIM, http://www.eecs.harvard.edu/~shnayder/ptossim/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, J.W., Lee, YH. (2006). ITB: Intrusion-Tolerant Broadcast Protocol in Wireless Sensor Networks. In: Gerndt, M., Kranzlmüller, D. (eds) High Performance Computing and Communications. HPCC 2006. Lecture Notes in Computer Science, vol 4208. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11847366_52
Download citation
DOI: https://doi.org/10.1007/11847366_52
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-39368-9
Online ISBN: 978-3-540-39372-6
eBook Packages: Computer ScienceComputer Science (R0)