scispace - formally typeset
Book ChapterDOI

ITB: intrusion-tolerant broadcast protocol in wireless sensor networks

TLDR
This paper presents an idea for a base station to reliably and securely broadcast announcing messages to the network in an intrusion-tolerant way based on Mutual Verification scheme and demonstrates the effectiveness of the protocol by introducing a theorem and the proof of the theorem.
Abstract
A large-scale wireless sensor network relies on broadcast protocol for data communication. This paper presents an idea for a base station to reliably and securely broadcast announcing messages to the network in an intrusion-tolerant way. Our Intrusion-Tolerant Broadcast Protocol based on Mutual Verification scheme guarantees that no forged information can be propagated to the network if an intruder is assumed to not compromise the base station. We show that our proposed protocol successfully runs and also demonstrate the effectiveness of the protocol by introducing a theorem and the proof of the theorem.

read more

Citations
More filters
Proceedings ArticleDOI

Improving Reliability of Message Broadcast over Internet of Vehicles (IoVs)

TL;DR: This paper investigates the application of network coding concept to increase content of every transmission and achieve improved broadcast reliability with less number of retransmission, and proposed Code Aided Retransmission-based Error Recovery (CARER) scheme, and introduced an RTB/CTB handshake to overcome hidden node problem and reduce packets collision rate.
Proceedings ArticleDOI

Message dissemination reliability in vehicular networks

TL;DR: An efficient error recovery scheme which employs network coding concept to increase safety message broadcast reliability with a minimized number of encoded packet retransmissions is proposed.
References
More filters
Journal ArticleDOI

SPINS: security protocols for sensor networks

TL;DR: A suite of security protocols optimized for sensor networks: SPINS, which includes SNEP and μTESLA and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.

The Kerberos Network Authentication Service (V5)

J. Kohl, +1 more
TL;DR: This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system, presently in production use at MIT's Project Athena, and at other Internet sites.
Proceedings Article

Efficient and Secure Source Authentication for Multicast.

TL;DR: This paper proposes several substantial modifications and improvements to TESLA, which allows receivers to authenticate most packets as soon as they arrive, and improves the scalability of the scheme, reduce the space overhead for multiple instances, increase its resistance to denial-of-service attacks, and more.
Proceedings Article

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks

Donggang Liu, +1 more
TL;DR: A novel technique to replace the unicast-based initialization with a broadcast-based one is presented, which satisfies several nice properties, including low overhead, tolerance of message loss, scalability to large networks, and resistance to replay attacks as well as some known Denial of Service (DOS) attacks.
Related Papers (5)