• DocumentCode
    1665597
  • Title

    A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks

  • Author

    Tague, Patrick ; Lee, Jooyoung ; Poovendran, Radha

  • Author_Institution
    Dept. of Electr. Eng., Washington Univ., Seattle, WA
  • fYear
    2005
  • Firstpage
    254
  • Lastpage
    259
  • Abstract
    We study attacks by adversaries which aim to compromise links in a wireless sensor network through various techniques which are modeled using the set-covering problem. We discuss the effects of the attacks and present techniques which can be used to mitigate the effects of the attacks. Furthermore, we analyze the performance of various key predistribution schemes with and without the mitigation techniques
  • Keywords
    telecommunication security; wireless sensor networks; attacks; key predistribution; mitigation techniques; set-covering approach; wireless sensor networks; Combinatorial mathematics; Cryptographic protocols; Cryptography; Intelligent networks; Large-scale systems; Performance analysis; Polynomials; Wireless application protocol; Wireless communication; Wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Sensing and Information Processing, 2005. ICISIP 2005. Third International Conference on
  • Conference_Location
    Bangalore
  • Print_ISBN
    0-7803-9588-3
  • Type

    conf

  • DOI
    10.1109/ICISIP.2005.1619445
  • Filename
    1619445