@inproceedings{b5b76ae9ac24418fbecd7fec18565bb9,
title = "Detecting compromised nodes in wireless sensor networks",
abstract = "While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if there are not measures taken to deal with this event. There have been many approaches researched to tackle the issue. In this paper, we look into an anomaly-based intrusion detection system to detect compromised nodes in wireless sensor networks. An algorithm to detect the compromised sensor nodes has been developed. Simulations are conducted to verify the design.",
keywords = "Algorithm, Compromise, Detection, Intrusion, Sensor networks",
author = "Mary Mathews and Min Song and Sachin Shetty and Rick McKenzie",
year = "2007",
doi = "10.1109/SNPD.2007.236",
language = "English",
isbn = "0769529097",
series = "Proceedings - SNPD 2007: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing",
pages = "273--278",
booktitle = "Proceedings - SNPD 2007",
note = "SNPD 2007: 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing ; Conference date: 30-07-2007 Through 01-08-2007",
}