• DocumentCode
    466861
  • Title

    Detecting Compromised Nodes in Wireless Sensor Networks

  • Author

    Mathews, Mary ; Song, Min ; Shetty, Sachin ; McKenzie, Rick

  • Author_Institution
    Old Dominion Univ., Norfolk
  • Volume
    1
  • fYear
    2007
  • fDate
    July 30 2007-Aug. 1 2007
  • Firstpage
    273
  • Lastpage
    278
  • Abstract
    While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if there are not measures taken to deal with this event. There have been many approaches researched to tackle the issue. In this paper, we look into an anomaly-based intrusion detection system to detect compromised nodes in wireless sensor networks. An algorithm to detect the compromised sensor nodes has been developed. Simulations are conducted to verify the design.
  • Keywords
    telecommunication security; wireless sensor networks; anomaly-based intrusion detection system; node detection intrusion compromise; wireless sensor networks; Application software; Artificial intelligence; Authentication; Cryptography; Data security; Degradation; Distributed computing; Intrusion detection; Software engineering; Wireless sensor networks; Sensor networks; algorithm; compromise; detection; intrusion;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on
  • Conference_Location
    Qingdao
  • Print_ISBN
    978-0-7695-2909-7
  • Type

    conf

  • DOI
    10.1109/SNPD.2007.538
  • Filename
    4287516