Compromised sensor nodes detection: A quantitative approach

Tao Li, Min Song, Mansoor Alam

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

19 Scopus citations

Abstract

In a wireless sensor network, an adversary may crack legal nodes or deploy malicious nodes to launch various attacks. These nodes are collectively called compromised nodes. In this paper, we define a Data Transmission Quality (DTQ) function to differentiate the legitimate nodes and compromised nodes. The DTQ function is defined in a way that it will keep close to constant or change smoothly for legitimate nodes and will keep decreasing for suspicious nodes. The final decision of whether or not a suspicious node is compromised is determined by a group voting procedure. Simulations were conducted to verify the effectiveness of the design.

Original languageEnglish
Title of host publicationProceedings - The 28th International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2008
Pages352-357
Number of pages6
DOIs
StatePublished - 2008
Event28th International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2008 - Beijing, China
Duration: 17 Jun 200820 Jun 2008

Publication series

NameProceedings - International Conference on Distributed Computing Systems

Conference

Conference28th International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2008
Country/TerritoryChina
CityBeijing
Period17/06/0820/06/08

Fingerprint

Dive into the research topics of 'Compromised sensor nodes detection: A quantitative approach'. Together they form a unique fingerprint.

Cite this