Adaptive security design with malicious node detection in cluster-based sensor networks

@article{Hsieh2007AdaptiveSD,
  title={Adaptive security design with malicious node detection in cluster-based sensor networks},
  author={Meng-Yen Hsieh and Yueh-Min Huang and H. Chao},
  journal={Computer Communications},
  year={2007},
  volume={30},
  pages={2385-2400}
}
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Therefore, sensor networks need to support an authentication service for sensor identity and message transmission. Furthermore, intrusion detection and prevention schemes are always integrated in sensor security appliances so that they can enhance network security by discovering malicious or compromised nodes. This study… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 47 CITATIONS

A Survey on Self-Adaptive Security for Large-scale Open Environments

VIEW 9 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Economics-driven approach for self-securing assets in cloud

VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Resilient Cluster Leader Election for Wireless Sensor Networks

  • 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
  • 2009
VIEW 5 EXCERPTS
CITES BACKGROUND, METHODS & RESULTS
HIGHLY INFLUENCED

Weighted-NEAT: An efficient weighted node evaluation scheme with assistant trust mechanisms to secure wireless ad hoc networks

  • 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops
  • 2009
VIEW 10 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-10 OF 39 REFERENCES

LHA-SP: secure protocols for hierarchical wireless sensor networks

  • 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005.
  • 2005
VIEW 1 EXCERPT