LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Citations
311 citations
308 citations
267 citations
262 citations
Cites background from "LEDS: Providing Location-Aware End-..."
...Secure localization and location verification can be used also for improving data security of IoT more generally by introducing a location-aware security framework [145]....
[...]
207 citations
References
14,340 citations
"LEDS: Providing Location-Aware End-..." refers background or methods in this paper
...In addition, LEDS also adopts a ðt; T Þ threshold linear secret sharing scheme (LSSS) [ 25 ] so that the sink can recover the original report from any t out of T legitimate report shares....
[...]
...On the other hand, to generate an authentic report, each node needs to compute two MACs and execute one LSSS operation, which can be performed using efficient Oðjpj log 2 jpjÞ algorithms [ 25 ]....
[...]
3,900 citations
"LEDS: Providing Location-Aware End-..." refers background in this paper
...2.2 End-to-End versus Hop-by-Hop Design In the past few years, many secret key predistribution schemes have been proposed [ 6 ], [8], [9], [10], [12], [13], [14], [15], [29]....
[...]
...We further note that the above bootstrapping operation can also be realized through the key predistribution approach [ 6 ], [12], instead of using mobile robots....
[...]
...Recent research has seen a growing body of work on security designs for WSNs [ 6 ], [8], [9], [10], [12], [13], [14], [15], [18], [19], [21], [36], [37], [38]....
[...]
3,648 citations
"LEDS: Providing Location-Aware End-..." refers methods in this paper
...We assume that every sensor node has a unique id and is similar to the current generation of sensor nodes (for example, the Berkeley MICA motes [ 24 ]) in its computation and communication capability and power resource....
[...]
3,125 citations
"LEDS: Providing Location-Aware End-..." refers background or result in this paper
...decreases, as shown in Fig. 4. Therefore, LEDS performs fairly well with respect to security resilience against random node capture attacks when compared with existing security designs [ 8 ], [12], [13]....
[...]
...2.2 End-to-End versus Hop-by-Hop Design In the past few years, many secret key predistribution schemes have been proposed [6], [ 8 ], [9], [10], [12], [13], [14], [15], [29]....
[...]
...Recent research has seen a growing body of work on security designs for WSNs [6], [ 8 ], [9], [10], [12], [13], [14], [15], [18], [19], [21], [36], [37], [38]....
[...]
2,946 citations
"LEDS: Providing Location-Aware End-..." refers background in this paper
...Last, LEDS provides high-level assurance on data availability by dealing with both report disruption attack [21] and selective forwarding attack [ 3 ] simultaneously....
[...]
...Lastly, the attacker could also use compromised nodes to launch a selective forwarding attack [ 3 ], in which case compromised nodes selectively drop the going-through data traffic and, thus, data availability can be severely damaged....
[...]
...To this end, any security design in WSNs should be highly resilient against two types of DoS attacks: report disruption attack [21] and selective forwarding attack [ 3 ], in which compromised nodes purposefully drop legitimate packets to disrupt the event report service by taking advantage of the en-route-filtering policy....
[...]
...The existence of the aforementioned attacks together with the inherent constraints of sensor nodes make it rather challenging to provide satisfying data security in WSNs with respect to all its three aspects, that is, confidentiality, authenticity, and availability [1], [2], [ 3 ], [4], [5]....
[...]
...LEDS further adopts a one-to-many report-forwarding paradigm, which ensures that the system is being highly resilient to selective message forward attacks [ 3 ]....
[...]