Wireless Sensor Network

Volume 3, Issue 1 (January 2011)

ISSN Print: 1945-3078   ISSN Online: 1945-3086

Google-based Impact Factor: 3.25  Citations  

Concealed Integrity Monitoring for Wireless Sensor Networks

HTML  Download Download as PDF (Size: 105KB)  PP. 10-17  
DOI: 10.4236/wsn.2011.31002    7,146 Downloads   11,955 Views  Citations

Affiliation(s)

.

ABSTRACT

Nowadays, sensor networks are widely installed around the world. Typical sensors provide data for healthcare, energy management, environmental monitoring, etc. In the future sensors will become a part of critical infrastructures. In such a scenario the network operator has to monitor the integrity of the network devices, otherwise the trustworthiness of the whole system is questionable. The problem is that every integrity protocol needs a secure channel between the devices. Therefore, we will introduce a covert channel for hidden transportation of integrity monitoring messages. The covert channel enables us to hide integrity check messages embedded into regular traffic without giving potential attackers a hint on the used integrity protocol.

Share and Cite:

B. Stelte and T. Bühring, "Concealed Integrity Monitoring for Wireless Sensor Networks," Wireless Sensor Network, Vol. 3 No. 1, 2011, pp. 10-17. doi: 10.4236/wsn.2011.31002.

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.