Compromised nodes in wireless sensor network

被引:0
作者
Lin, ZT [1 ]
Qu, YG [1 ]
Jing, L [1 ]
Zhao, BH [1 ]
机构
[1] Univ Sci & Technol China, MOE Microsoft Key Lab Multimedia Comp & Commun, Dept Elect Engn & Informat Sci, Hefei 230027, Anhui, Peoples R China
来源
ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS | 2006年 / 3842卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Sensor webs consisting of nodes with limited battery power and wireless communication are deployed to collect useful information from a variety of environments, A new challenge in the wireless sensor networks (WSN) is the compromised nodes problem. Compromised nodes may exhibit arbitrary behavior and may collude with other compromised nodes. In this paper, we propose a novel security strategy with assistant cluster heads, SSACH, which focuses on limiting the attack from compromised nodes. It adds the Assistant Cluster Heads (ACH) so as to monitor Cluster Head (CH) and take precautions against the inside attack.
引用
收藏
页码:224 / 230
页数:7
相关论文
共 50 条
  • [1] On Effect of Compromised Nodes on Security of Wireless Sensor Network
    Choudhury, Parichoy Pal
    Bagchi, Pramita
    Sengupta, Sebanti
    Ghosh, Anurag
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2010, 9 (3-4) : 255 - 273
  • [2] Protecting Data Aggregation From Compromised Nodes in Wireless Sensor Network
    Hu, Fulin
    Chen, Jing
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 231 - +
  • [3] AICN: An efficient algorithm to identify compromised nodes in wireless sensor network
    Lu, Rongxing
    Lin, Xiaodong
    Zhang, Chenxi
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1499 - 1504
  • [4] Using Network Traffic to Infer Compromised Neighbors in Wireless Sensor Nodes
    Chandramouli, J. M.
    Ramos, Juan
    Srinivasan, Lakshmi
    Suresh, Prahlad
    Kannan, Prashanth
    Crosby, Garth
    Watkins, Lanier
    [J]. 2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 1022 - 1023
  • [5] Detecting compromised nodes in wireless sensor networks
    Mathews, Mary
    Song, Min
    Shetty, Sachin
    McKenzie, Rick
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 273 - +
  • [6] A framework for identifying compromised nodes in wireless sensor networks
    Zhang, Qing
    Yu, Ting
    Ning, Peng
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (03)
  • [7] An active detection of compromised nodes based on en-route trap in wireless sensor network
    Wang, Jiang-Tao
    Liu, Zhi-Xiong
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (08):
  • [8] Overview of sensor nodes in wireless sensor network
    Xian Hao
    Zhang Jilong
    [J]. ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 3606 - 3609
  • [9] An efficient scheme for removing compromised sensor nodes from wireless sensor networks
    Wang, Yong
    Ramamurthy, Byrav
    Zou, Xukai
    Xue, Yuyan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (04) : 320 - 333
  • [10] Detecting compromised sensor node with subjective logic in wireless sensor network
    Zhou, Hongwei
    Yuan, Jinhui
    Zhang, Laishun
    Xiao, Rui
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2016, 71 : 719 - 724