DocumentCode
128417
Title
Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks
Author
Wei Min ; Keecheon Kim
Author_Institution
Dept. of Comput. Sci. & Eng., Konkuk Univ., Seoul, South Korea
fYear
2014
fDate
10-12 Feb. 2014
Firstpage
131
Lastpage
135
Abstract
Wireless sensor networks extend people´s ability to explore, monitor, and control the physical world. Wireless sensor networks are susceptible to certain types of attacks because they are deployed in open and unprotected environments. Novel intrusion tolerance architecture is proposed in this paper. An expert intrusion detection analysis system and an all-channel analyzer are introduced. A proposed intrusion tolerance scheme is implemented. Results show that this scheme can detect data traffic and re-route it to a redundant node in the wireless network, prolong the lifetime of the network, and isolate malicious traffic introduced through compromised nodes or illegal intrusions.
Keywords
data communication; telecommunication channels; telecommunication network routing; telecommunication security; telecommunication traffic; wireless sensor networks; all-channel analyzer; data traffic detection; expert intrusion detection analysis system; intrusion tolerance architecture; intrusion tolerance mechanisms; re-route detection; redundant node; redundant nodes; wireless sensor networks; Intrusion detection; Monitoring; Protocols; Routing; Wireless networks; Wireless sensor networks; Wireless Sensor networks; intrusion tolerance; security;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Networking (ICOIN), 2014 International Conference on
Conference_Location
Phuket
Type
conf
DOI
10.1109/ICOIN.2014.6799679
Filename
6799679
Link To Document