Fuzzy Logic Based Compromised Node Detection and Revocation in Clustered Wireless Sensor Networks

被引:0
作者
Geetha, R. [1 ]
Anand, S. Raj [2 ]
Kannan, E. [3 ]
机构
[1] Vel Tech Dr RR & Dr SR Tech Univ, SA Engn Coll, Dept CSE, Madras, Tamil Nadu, India
[2] Vel Tech Dr RR & Dr SR Tech Univ, Dept CSE, Madras, Tamil Nadu, India
[3] Vel Tech Dr RR & Dr SR Tech Univ, Sch Comp & Informat Technol, Madras, Tamil Nadu, India
来源
2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2014年
关键词
Compromised Node Detection; fuzzy reasoning; wireless sensor networks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks contain a large number of nodes which are unattended in nature where an adversary can physically capture and compromise the nodes and later inject a range of attacks with these compromised nodes. In order to minimize the damage caused by the compromised nodes, the system should identify and remove them as early as possible. Researchers recently have proposed a number of compromise detection schemes in sensor networks. Trust based schemes are capable of detecting compromised nodes but do not revoke them because of the overhead of false positives. Other methods like software attestation have got overhead in the periodical node attestation. We propose a cluster based node compromise node detection and revocation scheme which reduces the limitations of the existing schemes. In this scheme the concept of Fuzzy logic is used to make a decision over the clusters whether they contain suspicious nodes. After identifying the suspected clusters the software attestation is performed against the nodes which lead to the identification and revocation of compromised nodes from the network. Our proposed scheme shows that it performs well in the presence of false positives and false negatives.
引用
收藏
页数:6
相关论文
共 12 条
  • [1] ABUHMED T, 2009, P IEEE GLOBECOM
  • [2] [Anonymous], 2012, IEEE SENSORS J
  • [3] [Anonymous], P 4 INT S INF PROC S
  • [4] GANERIWAL S, 2004, P ACM WORKSH SEC AD
  • [5] Jun- Won Ho, 2012, IEEE T DEPENDABLE SE, V9
  • [6] LI F, 2007, P IEEE INFOCOM
  • [7] Soft tamper-proofing via program integrity verification in wireless sensor networks
    Park, T
    Shin, KG
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2005, 4 (03) : 297 - 309
  • [8] PARNO B, 2005, P IEEE S SEC PRIV S
  • [9] Seshadri A., 2004, P IEEE S SEC PRIV S
  • [10] Sun K., 2006, P ACM C COMP COMM SE