Compromised nodes in wireless sensor network

被引:0
|
作者
Lin, ZT [1 ]
Qu, YG [1 ]
Jing, L [1 ]
Zhao, BH [1 ]
机构
[1] Univ Sci & Technol China, MOE Microsoft Key Lab Multimedia Comp & Commun, Dept Elect Engn & Informat Sci, Hefei 230027, Anhui, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Sensor webs consisting of nodes with limited battery power and wireless communication are deployed to collect useful information from a variety of environments, A new challenge in the wireless sensor networks (WSN) is the compromised nodes problem. Compromised nodes may exhibit arbitrary behavior and may collude with other compromised nodes. In this paper, we propose a novel security strategy with assistant cluster heads, SSACH, which focuses on limiting the attack from compromised nodes. It adds the Assistant Cluster Heads (ACH) so as to monitor Cluster Head (CH) and take precautions against the inside attack.
引用
收藏
页码:224 / 230
页数:7
相关论文
共 50 条
  • [1] On Effect of Compromised Nodes on Security of Wireless Sensor Network
    Choudhury, Parichoy Pal
    Bagchi, Pramita
    Sengupta, Sebanti
    Ghosh, Anurag
    AD HOC & SENSOR WIRELESS NETWORKS, 2010, 9 (3-4) : 255 - 273
  • [2] Protecting Data Aggregation From Compromised Nodes in Wireless Sensor Network
    Hu, Fulin
    Chen, Jing
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 231 - +
  • [3] AICN: An efficient algorithm to identify compromised nodes in wireless sensor network
    Lu, Rongxing
    Lin, Xiaodong
    Zhang, Chenxi
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1499 - 1504
  • [4] Using Network Traffic to Infer Compromised Neighbors in Wireless Sensor Nodes
    Chandramouli, J. M.
    Ramos, Juan
    Srinivasan, Lakshmi
    Suresh, Prahlad
    Kannan, Prashanth
    Crosby, Garth
    Watkins, Lanier
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 1022 - 1023
  • [5] Detecting compromised nodes in wireless sensor networks
    Mathews, Mary
    Song, Min
    Shetty, Sachin
    McKenzie, Rick
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 273 - +
  • [6] A framework for identifying compromised nodes in wireless sensor networks
    Zhang, Qing
    Yu, Ting
    Ning, Peng
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (03)
  • [7] An active detection of compromised nodes based on en-route trap in wireless sensor network
    Wang, Jiang-Tao
    Liu, Zhi-Xiong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (08):
  • [8] Overview of sensor nodes in wireless sensor network
    Xian Hao
    Zhang Jilong
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 3606 - 3609
  • [9] An efficient scheme for removing compromised sensor nodes from wireless sensor networks
    Wang, Yong
    Ramamurthy, Byrav
    Zou, Xukai
    Xue, Yuyan
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (04) : 320 - 333
  • [10] Detecting compromised sensor node with subjective logic in wireless sensor network
    Zhou, Hongwei
    Yuan, Jinhui
    Zhang, Laishun
    Xiao, Rui
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2016, 71 : 719 - 724