Proceedings of the 2007 International Conference on Wireless Communications and Mobile Computing 2007
DOI: 10.1145/1280940.1280993
|View full text |Cite
|
Sign up to set email alerts
|

Sensor node compromise detection

Abstract: Node compromise is a serious security threat that hinders the successful deployment of large-scale wireless sensor networks. A node compromise often consists of three stages: physically obtaining and compromising the sensors, redeploying the compromised sensors, and compromised nodes launching attacks after their rejoining the network. By far, all the proposed compromise detection schemes address this problem at the third stage. In this paper, we make the first attempt to detect node compromise at the second s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(41 citation statements)
references
References 7 publications
0
41
0
Order By: Relevance
“…b) The IDS described in [25] requires neighborhood-wide cooperation to measure distances between nodes in a static network, which allows to detect unexpected changes in localization that are characteristic of a node being manipulated. A similar neighborhood-wide effort can identify Sybil intruders (single nodes that use multiple identities) through signal strength, as described in [11].…”
Section: Inputs Based On the Network Topologymentioning
confidence: 99%
See 1 more Smart Citation
“…b) The IDS described in [25] requires neighborhood-wide cooperation to measure distances between nodes in a static network, which allows to detect unexpected changes in localization that are characteristic of a node being manipulated. A similar neighborhood-wide effort can identify Sybil intruders (single nodes that use multiple identities) through signal strength, as described in [11].…”
Section: Inputs Based On the Network Topologymentioning
confidence: 99%
“…To prevent this, the IDS would need countermeasures preventing message alterations, such as choosing the right protocols to have integrity and authenticity of the messages, or using more IDS inputs such as the ones used by [9]. The other way to prevent this attack would be to prevent the compromise of nodes, either through specific inputs (see for instance [31] or [25]). …”
Section: Modeling Existing Idsmentioning
confidence: 99%
“…The public-key protocols have different levels of security and complexity. The protocol presented in [2] uses homomorphic encryption scheme [24], to prevent the node compromise [14] which supports unlimited additive operations and one multiplicative operation on encrypted data.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast to disables nodes, compromised nodes actively seek to disrupt or paralyze the network. From Song et al (2007) the method of obtaining the compromised nodes and counters are given. Attackers capture the sensor node and reprogram them.…”
Section: Introductionmentioning
confidence: 99%