• DocumentCode
    128417
  • Title

    Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks

  • Author

    Wei Min ; Keecheon Kim

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Konkuk Univ., Seoul, South Korea
  • fYear
    2014
  • fDate
    10-12 Feb. 2014
  • Firstpage
    131
  • Lastpage
    135
  • Abstract
    Wireless sensor networks extend people´s ability to explore, monitor, and control the physical world. Wireless sensor networks are susceptible to certain types of attacks because they are deployed in open and unprotected environments. Novel intrusion tolerance architecture is proposed in this paper. An expert intrusion detection analysis system and an all-channel analyzer are introduced. A proposed intrusion tolerance scheme is implemented. Results show that this scheme can detect data traffic and re-route it to a redundant node in the wireless network, prolong the lifetime of the network, and isolate malicious traffic introduced through compromised nodes or illegal intrusions.
  • Keywords
    data communication; telecommunication channels; telecommunication network routing; telecommunication security; telecommunication traffic; wireless sensor networks; all-channel analyzer; data traffic detection; expert intrusion detection analysis system; intrusion tolerance architecture; intrusion tolerance mechanisms; re-route detection; redundant node; redundant nodes; wireless sensor networks; Intrusion detection; Monitoring; Protocols; Routing; Wireless networks; Wireless sensor networks; Wireless Sensor networks; intrusion tolerance; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Networking (ICOIN), 2014 International Conference on
  • Conference_Location
    Phuket
  • Type

    conf

  • DOI
    10.1109/ICOIN.2014.6799679
  • Filename
    6799679