The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sensor networks have the potential to allow users to “query the physical world” by querying the sensor nodes for an aggregate result. However, a concern with such aggregation is that a few corrupt nodes in the network may manipulate the results that the querier sees. There has been a substantial amount of work on providing integrity for sensor network computations. However to the best of our knowledge,...
The node capture attack on wireless sensor networks (WSNs) can be broken into three stages: node capture, node redeployment, and insider attacks. Existing detection techniques of the attack are mostly implemented in the second stage. Recent discovery proved the feasibility of quick and effective detection in the first stage. We propose a hello message based first stage detection scheme, which is faster,...
Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that are immobile and have pre-defined communication patterns. We argue that node mobility is a realistic characteristic of sensor nodes that needs to be taken into consideration in future...
The development of sensor technology has led to applications ranging from academic to military. These tiny sensors are deployed in environments where security for data or hardware cannot be guaranteed. Unfortunately due to the resource constraints, traditional security schemes cannot be directly applied. In this paper, an efficient way of detecting an intrusion using ant colony is proposed. The architecture...
Intrusion detection is an efficient method against attacks in computer network and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection agents and suffered from a computation and memory usage overload. In this paper, we address this problem by proposing a lightweight algorithm to select and activate the intrusion detection...
Aimed at developing an effective approach to future sensor networks, we proposed for the first time the tiered mobile network architecture and triangle-grid model, studied the problem of wireless sensor network security detection and the nodes movement control policy. Based on the model, we proposed an immune intrusion detection schema and a dynamic two-anchor nodes localization algorithm with classified...
This paper proposes a new approach of modeling the collaboration of sensor system artifacts to address the security and survivability concerns of sensor networks. The model considered is composed of sensors, base and users. Sensors are nodes that acquire and process data. Base is the node that acquires and processes data from sensors and provides an interface to access and monitor the sensor network...
For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficult and expensive to achieve. This is not only because adversaries may attack against sensor source privacy through traffic analysis, but also because sensor networks are very limited in resources. As such, a practical tradeoff...
Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of scarce resources in sensors. However, compromised and misbehaving nodes are a serious threat, as an attacker can employ them to eavesdrop on communication, inject forged data, or manipulate protocol operation. In this context,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.