Date Added: Mar 2012
The authors analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known Topology Maintenance Protocols (TMPs) for sensor networks. These protocols aim to increase the lifetime of the sensor network by only maintaining a subset of nodes in an active or awake state. The design of these protocols assumes that the sensor nodes will be deployed in a trusted, no adversarial environment, and does not take into account the impact of attacks launched by malicious insider or outsider nodes. They propose a met protocol (Meta-TMP) to represent the class of topology maintenance protocols. The Meta-TMP provides one with a better understanding of the characteristics and of how a specific TMP works, and it can be used to study the vulnerabilities of a specific TMP.