Detection of compromised wireless sensor nodes

Min Song, Gregory E. Patrick, George Hsieh

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

In wireless sensor networks, an adversary may deploy malicious nodes into the network or physically obtain legitimate nodes, reprogram and redeploy them into the network to launch various attacks. These nodes are collectively called compromised nodes. They can undermine the network security by launching various attacks at various layers. In this chapter, we analyze the unique features of wireless sensor networks and present the challenges of compromised nodes detection. We classify the techniques for detecting compromised nodes into authentication-based and behavior-based methods. The state-of-the-art detection techniques are briefly surveyed. Finally, we describe the details of one specific technique based on data transmission quality and its performance.

Original languageEnglish
Title of host publicationHandbook on Sensor Networks
Pages495-510
Number of pages16
ISBN (Electronic)9789812837318
DOIs
StatePublished - 1 Jan 2010

Fingerprint

Dive into the research topics of 'Detection of compromised wireless sensor nodes'. Together they form a unique fingerprint.

Cite this