DocumentCode :
2555491
Title :
Maintaining functional module integrity in sensor networks
Author :
Pongaliur, Kanthakumar ; Wang, Chen ; Xiao, Li
Author_Institution :
Dept. of Comput. Sci. & Eng., Michigan State Univ.
fYear :
2005
fDate :
7-7 Nov. 2005
Lastpage :
806
Abstract :
Security is one of the top concerns when sensors are deployed in hostile environments for military applications. Attacks on sensor nodes can be categorized into two types: attacks through radio signals to alter the functionalities of sensors and physical attacks; which may completely damage sensors. We show that the former is easier to launch and more disguised, thus more hazardous. The layered framework proposed in this paper is specially designed to defend against the first type of attacks. Different from precious reputation-based approaches or data mining technologies which usually incur large communication and computation overhead, our solution only involves localized computation which is less intensive, thus can be implemented on-board with little burden on current MICA2 platforms. Besides identifying malicious nodes, our solution can also recover the normal functionalities of sensors, which have been altered by malicious radio signals
Keywords :
data mining; telecommunication security; wireless sensor networks; data mining technologies; functional module integrity; military applications; radio signals; reputation-based approaches; sensor networks; Communication system security; Computer science; Data mining; Data security; Intelligent networks; Maintenance engineering; Military computing; Protection; Sensor phenomena and characterization; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Adhoc and Sensor Systems Conference, 2005. IEEE International Conference on
Conference_Location :
Washington, DC
Print_ISBN :
0-7803-9465-8
Type :
conf
DOI :
10.1109/MAHSS.2005.1542874
Filename :
1542874
Link To Document :
بازگشت