Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Com 2007
DOI: 10.1109/snpd.2007.538
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Compromised Nodes in Wireless Sensor Networks

Abstract: While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if there are not measures taken to deal with this event. There have been many approaches researched to tackle the issue. In this paper, we look into an anomaly-based intrusion detection system to detect compromised node… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 7 publications
(6 reference statements)
0
14
0
Order By: Relevance
“…The observed parameters include efficient utilization of communication bandwidth within the clusters, avoiding redundant message transfer between the nodes, localizing energy efficient route setup within the clusters, reduction in energy consumption, etc. [1], [2] made an analysis that reliable routing of packets from nodes to its base station is the most important task for the networks. Routing in wireless networks is bit more complex than other wired networks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The observed parameters include efficient utilization of communication bandwidth within the clusters, avoiding redundant message transfer between the nodes, localizing energy efficient route setup within the clusters, reduction in energy consumption, etc. [1], [2] made an analysis that reliable routing of packets from nodes to its base station is the most important task for the networks. Routing in wireless networks is bit more complex than other wired networks.…”
Section: Related Workmentioning
confidence: 99%
“…Clustering produces initial categories in which values of a data set are further classified during the classification process. Previous works [1,2] have tried to develop intelligent receivers that are capable of identifying the incoming modulation scheme and reconfigure themselves accordingly. However, these architectures support only a very limited number of constellations, thus limiting both generality and performance [13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…While these provide insight into securing virtual coordinate systems, the majority of the solutions rely on assumptions that are not applicable in the P2P domain. Defense mechanisms such as SPINE [Capkun and Hubaux 2005], LAD [Du et al 2006], and TCSD [Chen et al 2008] as well as those proposed by and Mathews et al [2007] rely heavily on a pre-defined set of reference nodes to identify potentially malicious activity. ROPE , SLA [Anjum et al 2005], and the work by Mathews et al [2007] require the reference nodes to be trusted.…”
Section: Secure Localization In Sensor Networkmentioning
confidence: 99%
“…We assume that a compromised node is eventually detected: different detection strategies exist in literature [14,15]. If a node is compromised, the ACM increments c 1 and c 2 , and transfers to all non-compromised sensors, on a secure channel, the updated value S = h(S, c 1 ): this step can be performed through a secure broadcast scheme 4 .…”
Section: Putting It All Togethermentioning
confidence: 99%
“…This is a common assumption, and it represents an active area of research (for instance see [14,15]). Last, we assume that there is a way to distribute key updates secretly and on an authenticated channel, and there is a way to distribute authenticated messages commanding nodes to update their counters.…”
Section: Scheme Analysismentioning
confidence: 99%