Abstract
In wireless sensor networks, an adversary may deploy malicious nodes into the network or physically obtain legitimate nodes, reprogram and redeploy them into the network to launch various attacks. These nodes are collectively called compromised nodes. They can undermine the network security by launching various attacks at various layers. In this chapter, we analyze the unique features of wireless sensor networks and present the challenges of compromised nodes detection. We classify the techniques for detecting compromised nodes into authentication-based and behavior-based methods. The state-of-the-art detection techniques are briefly surveyed. Finally, we describe the details of one specific technique based on data transmission quality and its performance.
| Original language | English |
|---|---|
| Title of host publication | Handbook on Sensor Networks |
| Pages | 495-510 |
| Number of pages | 16 |
| ISBN (Electronic) | 9789812837318 |
| DOIs | |
| State | Published - 1 Jan 2010 |
Fingerprint
Dive into the research topics of 'Detection of compromised wireless sensor nodes'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver