Reuse-attack mitigation in wireless sensor networks

H. Shafiei, Ahmad Khonsari, B. Mirzasoleiman, Mohamed Ould-Khaoua

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Privacy preservation in wireless sensor networks has drawn considerable attention from research community during last few years. Emergence of single-owner, multi-user commercial sensor networks along with hostile and uncontrollable environment of such networks, makes the security issue in such networks of a great importance. This paper concentrates on token-based privacy preservation schemes. A possible attack on such schemes has been introduced. Two different approaches has been utilized to mitigate the attack. We present mathematical models for it's effects and overheads. The results have been verified using extensive simulations.

Original languageEnglish
Title of host publicationIEEE International Conference on Communications
DOIs
Publication statusPublished - 2011
Event2011 IEEE International Conference on Communications, ICC 2011 - Kyoto, Japan
Duration: Jun 5 2011Jun 9 2011

Other

Other2011 IEEE International Conference on Communications, ICC 2011
CountryJapan
CityKyoto
Period6/5/116/9/11

Fingerprint

Sensor networks
Wireless sensor networks
Mathematical models

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications

Cite this

Shafiei, H., Khonsari, A., Mirzasoleiman, B., & Ould-Khaoua, M. (2011). Reuse-attack mitigation in wireless sensor networks. In IEEE International Conference on Communications [5963399] https://doi.org/10.1109/icc.2011.5963399

Reuse-attack mitigation in wireless sensor networks. / Shafiei, H.; Khonsari, Ahmad; Mirzasoleiman, B.; Ould-Khaoua, Mohamed.

IEEE International Conference on Communications. 2011. 5963399.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shafiei, H, Khonsari, A, Mirzasoleiman, B & Ould-Khaoua, M 2011, Reuse-attack mitigation in wireless sensor networks. in IEEE International Conference on Communications., 5963399, 2011 IEEE International Conference on Communications, ICC 2011, Kyoto, Japan, 6/5/11. https://doi.org/10.1109/icc.2011.5963399
Shafiei H, Khonsari A, Mirzasoleiman B, Ould-Khaoua M. Reuse-attack mitigation in wireless sensor networks. In IEEE International Conference on Communications. 2011. 5963399 https://doi.org/10.1109/icc.2011.5963399
Shafiei, H. ; Khonsari, Ahmad ; Mirzasoleiman, B. ; Ould-Khaoua, Mohamed. / Reuse-attack mitigation in wireless sensor networks. IEEE International Conference on Communications. 2011.
@inproceedings{ef28ae11985c4e2fbab2bf57bb2731bd,
title = "Reuse-attack mitigation in wireless sensor networks",
abstract = "Privacy preservation in wireless sensor networks has drawn considerable attention from research community during last few years. Emergence of single-owner, multi-user commercial sensor networks along with hostile and uncontrollable environment of such networks, makes the security issue in such networks of a great importance. This paper concentrates on token-based privacy preservation schemes. A possible attack on such schemes has been introduced. Two different approaches has been utilized to mitigate the attack. We present mathematical models for it's effects and overheads. The results have been verified using extensive simulations.",
author = "H. Shafiei and Ahmad Khonsari and B. Mirzasoleiman and Mohamed Ould-Khaoua",
year = "2011",
doi = "10.1109/icc.2011.5963399",
language = "English",
isbn = "9781612842332",
booktitle = "IEEE International Conference on Communications",

}

TY - GEN

T1 - Reuse-attack mitigation in wireless sensor networks

AU - Shafiei, H.

AU - Khonsari, Ahmad

AU - Mirzasoleiman, B.

AU - Ould-Khaoua, Mohamed

PY - 2011

Y1 - 2011

N2 - Privacy preservation in wireless sensor networks has drawn considerable attention from research community during last few years. Emergence of single-owner, multi-user commercial sensor networks along with hostile and uncontrollable environment of such networks, makes the security issue in such networks of a great importance. This paper concentrates on token-based privacy preservation schemes. A possible attack on such schemes has been introduced. Two different approaches has been utilized to mitigate the attack. We present mathematical models for it's effects and overheads. The results have been verified using extensive simulations.

AB - Privacy preservation in wireless sensor networks has drawn considerable attention from research community during last few years. Emergence of single-owner, multi-user commercial sensor networks along with hostile and uncontrollable environment of such networks, makes the security issue in such networks of a great importance. This paper concentrates on token-based privacy preservation schemes. A possible attack on such schemes has been introduced. Two different approaches has been utilized to mitigate the attack. We present mathematical models for it's effects and overheads. The results have been verified using extensive simulations.

UR - http://www.scopus.com/inward/record.url?scp=80052179519&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80052179519&partnerID=8YFLogxK

U2 - 10.1109/icc.2011.5963399

DO - 10.1109/icc.2011.5963399

M3 - Conference contribution

SN - 9781612842332

BT - IEEE International Conference on Communications

ER -