[PDF][PDF] An Efficient Compromised Nodes Detection System in Wireless Sensor Networks.

X Xu, Z Gao, L Han - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Wireless sensor networks have limited resources and are deployed in an open environment,
this makes it vulnerable to attacks. The CND method we proposed can accurately detect the …

First stage detection of compromised nodes in sensor networks

W Ding, B Laha, S Yenduri - 2010 IEEE Sensors Applications …, 2010 - ieeexplore.ieee.org
The node capture attack in wireless sensor networks (WSNs) can be decomposed into three
stages: physically capture of node, redeployment of compromised node, and rejoin the …

Distributed detection of node capture attacks in wireless sensor networks

JW Ho - smart wireless sensor networks, 2010 - books.google.com
Wireless sensor networks are vulnerable to node capture attacks because sensor nodes are
usually deployed in unattended manner. Once attacker captures sensor nodes, he can …

[PDF][PDF] ComSen: A detection system for identifying compromised nodes in wireless sensor networks

YT Wang, R Bagrodia - The Sixth International Conference on …, 2012 - personales.upv.es
Wireless sensor networks (WSNs) are vulnerable to adversaries as they are frequently
deployed in open and unattended environments. Adversaries can extract vital information …

[图书][B] Efficient detection of compromised nodes in wireless sensor networks

CV Hinds - 2012 - dl.acm.org
Wireless Sensor Networks (WSNs) are networks which often consist of hundreds or
thousands of devices called sensor nodes which monitor or identify the occurrence of an …

Node compromise detection in wireless sensor networks

JW Ho, SK Das - Handbook on Securing Cyber-Physical Critical …, 2012 - books.google.com
In many applications involving wireless sensor networks, the network operator usually
deploys sensor nodes in unattended fashion and remotely controls them. Hence, an …

A synopsis on node compromise detection in wireless sensor networks using sequential analysis (Invited Review Article)

SK Das, JW Ho - Computer communications, 2011 - Elsevier
By exploiting the unattended nature of the wireless sensor networks, an attacker can
physically capture and compromise sensor nodes and then launch a variety of attacks. He …

Node capture attack detection and defence in wireless sensor networks

SH Jokhio, IA Jokhio, AH Kemp - IET wireless sensor systems, 2012 - IET
Wireless sensor network (WSN) applications are often deployed under hostile environments.
Monitoring sensor nodes carefully, detecting and providing defence against malicious …

Efficient detection of compromised nodes in a wireless sensor network

CV Hinds - Proceedings of the 2009 Spring Simulation …, 2009 - dl.acm.org
Wireless Sensor Networks are networks composed of hundreds or thousands of small
sensors which are often placed in hostile environments to sense a particular event in that …

Detection of compromised sensor nodes in heterogeneous sensor networks

X Du - 2008 IEEE International Conference on …, 2008 - ieeexplore.ieee.org
An attacker can capture sensor nodes operating in an unattended environment, load
malicious code in the nodes, and then redeploy the compromised nodes into the network …