Detecting compromised nodes in wireless sensor networks

Mary Mathews, Min Song, Sachin Shetty, Rick McKenzie

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

28 Scopus citations

Abstract

While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if there are not measures taken to deal with this event. There have been many approaches researched to tackle the issue. In this paper, we look into an anomaly-based intrusion detection system to detect compromised nodes in wireless sensor networks. An algorithm to detect the compromised sensor nodes has been developed. Simulations are conducted to verify the design.

Original languageEnglish
Title of host publicationProceedings - SNPD 2007
Subtitle of host publicationEighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
Pages273-278
Number of pages6
DOIs
StatePublished - 2007
EventSNPD 2007: 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Qingdao, China
Duration: 30 Jul 20071 Aug 2007

Publication series

NameProceedings - SNPD 2007: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
Volume1

Conference

ConferenceSNPD 2007: 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
Country/TerritoryChina
CityQingdao
Period30/07/071/08/07

Keywords

  • Algorithm
  • Compromise
  • Detection
  • Intrusion
  • Sensor networks

Fingerprint

Dive into the research topics of 'Detecting compromised nodes in wireless sensor networks'. Together they form a unique fingerprint.

Cite this