Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SNPD.2007.236guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Detecting Compromised Nodes in Wireless Sensor Networks

Published: 30 July 2007 Publication History

Abstract

While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if there are not measures taken to deal with this event. There have been many approaches researched to tackle the issue. In this paper, we look into an anomaly-based intrusion detection system to detect compromised nodes in wireless sensor networks. An algorithm to detect the compromised sensor nodes has been developed. Simulations are conducted to verify the design.

Cited By

View all
  • (2018)Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow ControlProceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy10.1145/3264888.3264889(48-59)Online publication date: 15-Oct-2018
  • (2015)Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor NetworkProceedings of the 11th International Conference on Information Systems Security - Volume 947810.1007/978-3-319-26961-0_25(419-440)Online publication date: 16-Dec-2015
  • (2010)Robust Decentralized Virtual Coordinate Systems in Adversarial EnvironmentsACM Transactions on Information and System Security10.1145/1880022.188003213:4(1-34)Online publication date: 1-Dec-2010

Index Terms

  1. Detecting Compromised Nodes in Wireless Sensor Networks

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        SNPD '07: Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Volume 01
        July 2007
        886 pages
        ISBN:0769529097

        Publisher

        IEEE Computer Society

        United States

        Publication History

        Published: 30 July 2007

        Author Tags

        1. Sensor networks
        2. algorithm
        3. compromise
        4. detection
        5. intrusion

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 18 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2018)Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow ControlProceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy10.1145/3264888.3264889(48-59)Online publication date: 15-Oct-2018
        • (2015)Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor NetworkProceedings of the 11th International Conference on Information Systems Security - Volume 947810.1007/978-3-319-26961-0_25(419-440)Online publication date: 16-Dec-2015
        • (2010)Robust Decentralized Virtual Coordinate Systems in Adversarial EnvironmentsACM Transactions on Information and System Security10.1145/1880022.188003213:4(1-34)Online publication date: 1-Dec-2010

        View Options

        View options

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media