A synopsis on node compromise detection in wireless sensor networks using sequential analysis (Invited Review Article)

被引:4
作者
Das, Sajal K. [2 ]
Ho, Jun-Won [1 ]
机构
[1] Seoul Womens Univ, Dept Informat Secur, Seoul, South Korea
[2] Univ Texas Arlington, Dept Comp Sci & Engn, Ctr Res Wireless Mobil & Networking CReWMaN, Arlington, TX 76019 USA
关键词
Node compromise; Node replication; Sequential Probability Ratio Test; ATTACKS;
D O I
10.1016/j.comcom.2011.07.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By exploiting the unattended nature of the wireless sensor networks, an attacker can physically capture and compromise sensor nodes and then launch a variety of attacks. He can additionally create many replicas of a few compromised nodes and spread these replicas over the network, thus launching further attacks with their help. In order to minimize the damage incurred by compromised and replicated nodes, it is very important to detect such malicious nodes as quickly as possible. In this review article, we synthesize our previous works on node compromise detection in sensor networks while providing the extended analysis in terms of performance comparison to the related work. More specifically, we use the methodology of the sequential analysis to detect static and mobile compromised nodes, as well as mobile replicated nodes in sensor networks. With the help of analytical and simulation results, we also demonstrate that our schemes provide robust and efficient node compromise detection capability. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:2003 / 2012
页数:10
相关论文
共 31 条
[1]  
Agah A, 2005, IEEE ICC, P3218
[2]  
Alves Thaynara, 2004, Information Quarterly, V3
[3]  
[Anonymous], 2006, Elements of Information Theory
[4]  
[Anonymous], ACM WISE SEPT
[5]  
[Anonymous], IEEE S SEC PRIV MAY
[6]  
[Anonymous], THESIS U TEXAS ARLIN
[7]  
[Anonymous], ACSAC DEC
[8]  
[Anonymous], ACM MOBICOM SEPT
[9]  
[Anonymous], ACM SASN OCT
[10]  
[Anonymous], ESAS JUL