Reuse-attack mitigation in wireless sensor networks

H. Shafiei*, Ahmad Khonsari, B. Mirzasoleiman, Mohamed Ould-Khaoua

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Privacy preservation in wireless sensor networks has drawn considerable attention from research community during last few years. Emergence of single-owner, multi-user commercial sensor networks along with hostile and uncontrollable environment of such networks, makes the security issue in such networks of a great importance. This paper concentrates on token-based privacy preservation schemes. A possible attack on such schemes has been introduced. Two different approaches has been utilized to mitigate the attack. We present mathematical models for it's effects and overheads. The results have been verified using extensive simulations.

Original languageEnglish
Title of host publicationIEEE International Conference on Communications
Publication statusPublished - 2011
Event2011 IEEE International Conference on Communications, ICC 2011 - Kyoto, Japan
Duration: Jun 5 2011Jun 9 2011


Other2011 IEEE International Conference on Communications, ICC 2011

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications


Dive into the research topics of 'Reuse-attack mitigation in wireless sensor networks'. Together they form a unique fingerprint.

Cite this