Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 11 Issue 3, March 2008

Gene Tsudik
Article No.: 11
DOI: 10.1145/1341731.1341732

A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
Qing Zhang, Ting Yu, Peng Ning
Article No.: 12
DOI: 10.1145/1341731.1341733

Sensor networks are often subject to physical attacks. Once a node's cryptographic key is compromised, an attacker may completely impersonate it and introduce arbitrary false information into the network. Basic cryptographic mechanisms are often...

Redoubtable Sensor Networks
Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan
Article No.: 13
DOI: 10.1145/1341731.1341734

We give, for the first time, a precise mathematical analysis of the connectivity and security properties of sensor networks that make use of the random predistribution of keys. We also show how to set the parameters---pool and key ring size---in...

Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
Katharine Chang, Kang G. Shin
Article No.: 14
DOI: 10.1145/1341731.1341735

Security in wireless sensor networks has become important as they are being developed and deployed for an increasing number of applications. The severe resource constraints in each sensor make it very challenging to secure sensor networks....

Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Liang Xie, Sencun Zhu
Article No.: 15
DOI: 10.1145/1341731.1341736

Overlay multicast networks are used by service providers to distribute contents such as Web pages, static and streaming multimedia data, or security updates to a large number of users. However, such networks are extremely vulnerable to...

Noninvasive Methods for Host Certification
Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick McDaniel
Article No.: 16
DOI: 10.1145/1341731.1341737

Determining whether a user or system is exercising appropriate security practices is difficult in any context. Such difficulties are particularly pronounced when uncontrolled or unknown platforms join public networks. Commonly practiced techniques...