TY - GEN
T1 - Reuse-attack mitigation in wireless sensor networks
AU - Shafiei, H.
AU - Khonsari, Ahmad
AU - Mirzasoleiman, B.
AU - Ould-Khaoua, Mohamed
PY - 2011
Y1 - 2011
N2 - Privacy preservation in wireless sensor networks has drawn considerable attention from research community during last few years. Emergence of single-owner, multi-user commercial sensor networks along with hostile and uncontrollable environment of such networks, makes the security issue in such networks of a great importance. This paper concentrates on token-based privacy preservation schemes. A possible attack on such schemes has been introduced. Two different approaches has been utilized to mitigate the attack. We present mathematical models for it's effects and overheads. The results have been verified using extensive simulations.
AB - Privacy preservation in wireless sensor networks has drawn considerable attention from research community during last few years. Emergence of single-owner, multi-user commercial sensor networks along with hostile and uncontrollable environment of such networks, makes the security issue in such networks of a great importance. This paper concentrates on token-based privacy preservation schemes. A possible attack on such schemes has been introduced. Two different approaches has been utilized to mitigate the attack. We present mathematical models for it's effects and overheads. The results have been verified using extensive simulations.
UR - http://www.scopus.com/inward/record.url?scp=80052179519&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80052179519&partnerID=8YFLogxK
U2 - 10.1109/icc.2011.5963399
DO - 10.1109/icc.2011.5963399
M3 - Conference contribution
AN - SCOPUS:80052179519
SN - 9781612842332
T3 - IEEE International Conference on Communications
BT - 2011 IEEE International Conference on Communications, ICC 2011
T2 - 2011 IEEE International Conference on Communications, ICC 2011
Y2 - 5 June 2011 through 9 June 2011
ER -