{"title":"Trustworthily Forwarding Sensor Networks Information to the Internet","authors":"O. Powell, J. Seigneur, L. Moraru","doi":"10.1109/SECUREWARE.2007.4385306","DOIUrl":null,"url":null,"abstract":"The Internet is soon going to be extended with the information collected from sensor networks deployed in wild remote regions of the world. For example, sensors may be dispersed in the jungle and forward information about the sensed states of the natural ecosystem, such as, humidity, fire detection... However, it is still quite easy for attackers to disconnect the sensors network from the Internet. For example, the sensors usually forward their messages to a base station, the Internet gateway, in a hop-by-hop fashion because they are resource-constrained in terms of energy, the spending of energy dramatically increases with the range of transmission and the attackers may capture intermediate sensors and drop messages rather than forwarding them. In this paper we study how computational trust can be used to mitigate the issue of sinkhole attacks and evaluate our approach on top of the MIX protocol.","PeriodicalId":257937,"journal":{"name":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECUREWARE.2007.4385306","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The Internet is soon going to be extended with the information collected from sensor networks deployed in wild remote regions of the world. For example, sensors may be dispersed in the jungle and forward information about the sensed states of the natural ecosystem, such as, humidity, fire detection... However, it is still quite easy for attackers to disconnect the sensors network from the Internet. For example, the sensors usually forward their messages to a base station, the Internet gateway, in a hop-by-hop fashion because they are resource-constrained in terms of energy, the spending of energy dramatically increases with the range of transmission and the attackers may capture intermediate sensors and drop messages rather than forwarding them. In this paper we study how computational trust can be used to mitigate the issue of sinkhole attacks and evaluate our approach on top of the MIX protocol.