ITB: Intrusion-tolerant broadcast protocol in wireless sensor networks

Jin Wook Lee, Yann-Hang Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

A large-scale wireless sensor network relies on broadcast protocol for data communication. This paper presents an idea for a base station to reliably and securely broadcast announcing messages to the network in an intrusion-tolerant way. Our Intrusion-Tolerant Broadcast Protocol based on Mutual Verification scheme guarantees that no forged information can be propagated to the network if an intruder is assumed to not compromise the base station. We show that our proposed protocol successfully runs and also demonstrate the effectiveness of the protocol by introducing a theorem and the proof of the theorem.

Original languageEnglish (US)
Title of host publicationHigh Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings
PublisherSpringer Verlag
Pages505-514
Number of pages10
ISBN (Print)3540393684, 9783540393689
DOIs
StatePublished - Jan 1 2006
Event2nd International Conference on High Performance Computing and Communications, HPCC 2006 - Munich, Germany
Duration: Sep 13 2006Sep 15 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4208 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd International Conference on High Performance Computing and Communications, HPCC 2006
CountryGermany
CityMunich
Period9/13/069/15/06

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'ITB: Intrusion-tolerant broadcast protocol in wireless sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Lee, J. W., & Lee, Y-H. (2006). ITB: Intrusion-tolerant broadcast protocol in wireless sensor networks. In High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings (pp. 505-514). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4208 LNCS). Springer Verlag. https://doi.org/10.1007/11847366_52