Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2387238.2387267acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Security evaluation methodology for intrusion recovery protocols in wireless sensor networks

Published: 21 October 2012 Publication History

Abstract

Researchers have designed intrusion recovery protocols in Wireless Sensor Networks (WSN) with the aim of restoring compromised services and promoting a secure and reliable environment in WSNs. Currently, evaluation frameworks in WSNs have been proposed in a generic security context and do not constitute a representative assessment of intrusion recovery protocols. This paper proposes an evaluation methodology to aid the evaluation and comparison of intrusion recovery protocols in WSNs. The methodology defines the intrusion recovery protocol aspects that should be evaluated using a number of evaluation criteria and guides researchers in identifying the evaluation direction they should follow.

References

[1]
Stavrou, E., and Pitsillides, A. Combating persistent adversaries in WSNs using directional antennas, ICT 2011.
[2]
Crosby, G. V., Pissinou, N., and Makki, K. Location-aware, Trust-based Detection and Isolation of Compromised Nodes in WSN, Int. Journal of Network Security, 2006.
[3]
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. Wireless Sensor Networks: A Survey, Computer Networks (Elsevier), vol. 38, no. 4, pp. 393--422, March 2002.
[4]
Stavrou, E., and Pitsillides, A. A Survey on Secure Multipath Routing Protocols in WSNs, Computer Networks, 2010.
[5]
Zhang, Y., Huang, Y., and Lee, W. An extensible environment for evaluating secure MANET, SecureComm, pp. 339--352, 2005.
[6]
Ashraf, A., et al. Design and Analysis of the Security Assessment Framework for achieving Discrete Security Values in WSN. IEEE CCECE, 855--860, 2008.
[7]
Ransom, S., Pfisterer, D., and Fischer, S. Comprehensible Security Synthesis for WSN, MidSens'08, 2008.
[8]
Kalpana Sharma, M K Ghose, Kuldeep, Complete Security Framework for WSN, IJCSIS, 3, 1, 2009.

Cited By

View all
  • (2024)Enhancing Maritime Cybersecurity through Operational Technology Sensor Data Fusion: A Comprehensive Survey and AnalysisSensors10.3390/s2411345824:11(3458)Online publication date: 27-May-2024
  • (2017)Intrusion recovery in NLOS WSNs with a varying network density2017 24th International Conference on Telecommunications (ICT)10.1109/ICT.2017.7998272(1-5)Online publication date: May-2017
  • (2016)WSN operability during persistent attack execution2016 23rd International Conference on Telecommunications (ICT)10.1109/ICT.2016.7500448(1-5)Online publication date: May-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MSWiM '12: Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
October 2012
428 pages
ISBN:9781450316286
DOI:10.1145/2387238
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 October 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. intrusion recovery
  2. performance evaluation
  3. security
  4. wsn

Qualifiers

  • Research-article

Conference

MSWiM '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 398 of 1,577 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Enhancing Maritime Cybersecurity through Operational Technology Sensor Data Fusion: A Comprehensive Survey and AnalysisSensors10.3390/s2411345824:11(3458)Online publication date: 27-May-2024
  • (2017)Intrusion recovery in NLOS WSNs with a varying network density2017 24th International Conference on Telecommunications (ICT)10.1109/ICT.2017.7998272(1-5)Online publication date: May-2017
  • (2016)WSN operability during persistent attack execution2016 23rd International Conference on Telecommunications (ICT)10.1109/ICT.2016.7500448(1-5)Online publication date: May-2016
  • (2016)Situation aware intrusion recovery policy in WSNs2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)10.1109/CyberSA.2016.7503285(1-8)Online publication date: Jun-2016
  • (2015)Survey of secure multipath routing protocols for WSNsJournal of Network and Computer Applications10.1016/j.jnca.2015.04.01855(123-153)Online publication date: Sep-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media