{"title":"开放环境下无线传感器网络节点间投票伪造和隔离恶意节点的协同检测","authors":"Yoshiki Kimura, Eiji Nii, Y. Takizawa","doi":"10.1109/GIIS48668.2019.9044952","DOIUrl":null,"url":null,"abstract":"In wireless sensor networks deployed in open environments, e.g., public spaces, malicious can physically access the storage of sensor nodes, steal secure information such as encryption keys, and inject malicious sensor nodes that carry out falsifications with the stolen keys in networks. Conventional mechanisms for falsification detection generally use encryption with a completely secure key. Therefore, they cannot effectively be applied in such a situation in which the key is not secure and the reliability of the data is completely lost. To protect the reliability of wireless sensor networks without depending a secure key, we propose a mechanism that detects malicious nodes through the cooperation of legitimate (hereafter, proper) nodes and logically isolates the detected malicious nodes through inter-node vote from wireless sensor networks.","PeriodicalId":165839,"journal":{"name":"2019 Global Information Infrastructure and Networking Symposium (GIIS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cooperative Detection for Falsification and Isolation of Malicious Nodes through Inter-node Vote for Wireless Sensor Networks in Open Environments\",\"authors\":\"Yoshiki Kimura, Eiji Nii, Y. Takizawa\",\"doi\":\"10.1109/GIIS48668.2019.9044952\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In wireless sensor networks deployed in open environments, e.g., public spaces, malicious can physically access the storage of sensor nodes, steal secure information such as encryption keys, and inject malicious sensor nodes that carry out falsifications with the stolen keys in networks. Conventional mechanisms for falsification detection generally use encryption with a completely secure key. Therefore, they cannot effectively be applied in such a situation in which the key is not secure and the reliability of the data is completely lost. To protect the reliability of wireless sensor networks without depending a secure key, we propose a mechanism that detects malicious nodes through the cooperation of legitimate (hereafter, proper) nodes and logically isolates the detected malicious nodes through inter-node vote from wireless sensor networks.\",\"PeriodicalId\":165839,\"journal\":{\"name\":\"2019 Global Information Infrastructure and Networking Symposium (GIIS)\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Global Information Infrastructure and Networking Symposium (GIIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GIIS48668.2019.9044952\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Global Information Infrastructure and Networking Symposium (GIIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GIIS48668.2019.9044952","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cooperative Detection for Falsification and Isolation of Malicious Nodes through Inter-node Vote for Wireless Sensor Networks in Open Environments
In wireless sensor networks deployed in open environments, e.g., public spaces, malicious can physically access the storage of sensor nodes, steal secure information such as encryption keys, and inject malicious sensor nodes that carry out falsifications with the stolen keys in networks. Conventional mechanisms for falsification detection generally use encryption with a completely secure key. Therefore, they cannot effectively be applied in such a situation in which the key is not secure and the reliability of the data is completely lost. To protect the reliability of wireless sensor networks without depending a secure key, we propose a mechanism that detects malicious nodes through the cooperation of legitimate (hereafter, proper) nodes and logically isolates the detected malicious nodes through inter-node vote from wireless sensor networks.