DocumentCode
1665597
Title
A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks
Author
Tague, Patrick ; Lee, Jooyoung ; Poovendran, Radha
Author_Institution
Dept. of Electr. Eng., Washington Univ., Seattle, WA
fYear
2005
Firstpage
254
Lastpage
259
Abstract
We study attacks by adversaries which aim to compromise links in a wireless sensor network through various techniques which are modeled using the set-covering problem. We discuss the effects of the attacks and present techniques which can be used to mitigate the effects of the attacks. Furthermore, we analyze the performance of various key predistribution schemes with and without the mitigation techniques
Keywords
telecommunication security; wireless sensor networks; attacks; key predistribution; mitigation techniques; set-covering approach; wireless sensor networks; Combinatorial mathematics; Cryptographic protocols; Cryptography; Intelligent networks; Large-scale systems; Performance analysis; Polynomials; Wireless application protocol; Wireless communication; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligent Sensing and Information Processing, 2005. ICISIP 2005. Third International Conference on
Conference_Location
Bangalore
Print_ISBN
0-7803-9588-3
Type
conf
DOI
10.1109/ICISIP.2005.1619445
Filename
1619445
Link To Document