Intrusion Tolerance Mechanisms using Redundant Nodes for Wireless Sensor Networks

被引:0
作者
Min, Wei [1 ]
Kim, Keecheon [1 ]
机构
[1] Konkuk Univ, Dept Comp Sci & Engn, Seoul, South Korea
来源
2014 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2014) | 2014年
关键词
Wireless Sensor networks; security; intrusion tolerance;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks extend people's ability to explore, monitor, and control the physical world. Wireless sensor networks are susceptible to certain types of attacks because they are deployed in open and unprotected environments. Novel intrusion tolerance architecture is proposed in this paper. An expert intrusion detection analysis system and an all-channel analyzer are introduced. A proposed intrusion tolerance scheme is implemented. Results show that this scheme can detect data traffic and re-route it to a redundant node in the wireless network, prolong the lifetime of the network, and isolate malicious traffic introduced through compromised nodes or illegal intrusions.
引用
收藏
页码:131 / 135
页数:5
相关论文
共 8 条
  • [1] Al-Hamadi Hamid, 2013, NETWORK SERVICE MANA, V10, P1
  • [2] Bellalouna Monia, 2013, COMP INF TECHN WCCIT
  • [3] Feng Dong-qin, 2009, Journal of Zhejiang University, V43, P849
  • [4] Nabizadeh H., 2011, 2011 International Conference on Selected Topics in Mobile & Wireless Networking, P24, DOI 10.1109/iCOST.2011.6085830
  • [5] Wang Liang-Min, 2008, J IJ NETWORK SECURIT, V7, P261
  • [6] Wei M, 2012, INFORMATION-TOKYO, V15, P4457
  • [7] Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks
    Wei, Min
    Kim, Keecheon
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2012, 14 (03) : 310 - 318
  • [8] Location-based compromise-tolerant security mechanisms for wireless sensor networks
    Zhang, YC
    Liu, W
    Lou, WJ
    Fang, YG
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 247 - 260