Title :
Detecting Compromised Nodes in Wireless Sensor Networks
Author :
Mathews, Mary ; Song, Min ; Shetty, Sachin ; McKenzie, Rick
Author_Institution :
Old Dominion Univ., Norfolk
fDate :
July 30 2007-Aug. 1 2007
Abstract :
While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if there are not measures taken to deal with this event. There have been many approaches researched to tackle the issue. In this paper, we look into an anomaly-based intrusion detection system to detect compromised nodes in wireless sensor networks. An algorithm to detect the compromised sensor nodes has been developed. Simulations are conducted to verify the design.
Keywords :
telecommunication security; wireless sensor networks; anomaly-based intrusion detection system; node detection intrusion compromise; wireless sensor networks; Application software; Artificial intelligence; Authentication; Cryptography; Data security; Degradation; Distributed computing; Intrusion detection; Software engineering; Wireless sensor networks; Sensor networks; algorithm; compromise; detection; intrusion;
Conference_Titel :
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on
Conference_Location :
Qingdao
Print_ISBN :
978-0-7695-2909-7
DOI :
10.1109/SNPD.2007.538