{"title":"基于集合覆盖的无线传感器网络密钥预分配攻击建模方法","authors":"P. Tague, Jooyoung Lee, R. Poovendran","doi":"10.1109/ICISIP.2005.1619445","DOIUrl":null,"url":null,"abstract":"We study attacks by adversaries which aim to compromise links in a wireless sensor network through various techniques which are modeled using the set-covering problem. We discuss the effects of the attacks and present techniques which can be used to mitigate the effects of the attacks. Furthermore, we analyze the performance of various key predistribution schemes with and without the mitigation techniques","PeriodicalId":261916,"journal":{"name":"2005 3rd International Conference on Intelligent Sensing and Information Processing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks\",\"authors\":\"P. Tague, Jooyoung Lee, R. Poovendran\",\"doi\":\"10.1109/ICISIP.2005.1619445\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We study attacks by adversaries which aim to compromise links in a wireless sensor network through various techniques which are modeled using the set-covering problem. We discuss the effects of the attacks and present techniques which can be used to mitigate the effects of the attacks. Furthermore, we analyze the performance of various key predistribution schemes with and without the mitigation techniques\",\"PeriodicalId\":261916,\"journal\":{\"name\":\"2005 3rd International Conference on Intelligent Sensing and Information Processing\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2005 3rd International Conference on Intelligent Sensing and Information Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISIP.2005.1619445\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 3rd International Conference on Intelligent Sensing and Information Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISIP.2005.1619445","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks
We study attacks by adversaries which aim to compromise links in a wireless sensor network through various techniques which are modeled using the set-covering problem. We discuss the effects of the attacks and present techniques which can be used to mitigate the effects of the attacks. Furthermore, we analyze the performance of various key predistribution schemes with and without the mitigation techniques