Authenticated query flooding in sensor networks

被引:0
|
作者
Benenson, Zinaida [1 ]
Freiling, Felix C. [2 ]
Hammerschmidt, Ernest [1 ]
Lucks, Stefan [2 ]
Pimenidis, Lexi [1 ]
机构
[1] Rhein Westfal TH Aachen, Dept Comp Sci, Aachen, Germany
[2] Univ Mannheim, Dept Comp Sci, Mannheim, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a novel mechanism for authentication of queries in a sensor network in case these queries are flooded. In our protocol, the base station appends an authenticator to every query, such that each sensor can verify with certain probability that the query is sent by the base station. Implicit cooperation between sensor nodes during the flooding process ensures that legitimate queries propagate quickly in the network, whereas the propagation of illegitimate queries is limited to only a small part of the network.
引用
收藏
页码:38 / +
页数:3
相关论文
共 50 条
  • [1] Authenticated query flooding in sensor networks
    Benenson, Z
    Pimenidis, L
    Hammerschmidt, E
    Freiling, FC
    Lucks, S
    [J]. FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 644 - +
  • [2] Formally Verified Authenticated Query Dissemination in Sensor Networks
    Werner, Frank
    Benenson, Zinaida
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2009, 41 (04): : 154 - +
  • [3] Analysis of the authenticated query flooding protocol by probabilistic means
    Werner, Frank
    Schmitt, Peter H.
    [J]. 2008 FIFTH ANNUAL CONFERENCE ON WIRELESS ON DEMAND NETWORK SYSTEMS AND SERVICES, 2008, : 101 - 104
  • [4] A limited flooding scheme for query delivery in wireless sensor networks
    Son, J
    Ha, N
    Kim, K
    Ryu, J
    Son, J
    Han, KJ
    [J]. ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 276 - 280
  • [5] Data Query Protocol with Restriction Flooding in Wireless Sensor Networks
    Cui Yan-rong
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 665 - 668
  • [6] Authenticated queries in sensor networks
    Benenson, Z
    [J]. SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2005, 3813 : 54 - 67
  • [7] On authenticated skyline query processing over road networks
    Zhu, Xiaoyu
    Wu, Jie
    Chang, Wei
    Bhuiyan, Md Zakirul Alam
    Choo, Kim-Kwang Raymond
    Qi, Fang
    Liu, Qin
    Wang, Guojun
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (14):
  • [8] Query processing in sensor networks
    Erik Buchmann
    Nesime Tatbul
    Mario Nascimento
    [J]. Distributed and Parallel Databases, 2011, 29 : 1 - 2
  • [9] Query processing in sensor networks
    Gehrke, J
    Madden, S
    [J]. IEEE PERVASIVE COMPUTING, 2004, 3 (01) : 46 - 55
  • [10] Query processing in sensor networks
    Buchmann, Erik
    Tatbul, Nesime
    Nascimento, Mario
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2011, 29 (1-2) : 1 - 2