Sensor node compromise detection: the location perspective

@inproceedings{Song2007SensorNC,
  title={Sensor node compromise detection: the location perspective},
  author={Hui Song and Liang Xie and Sencun Zhu and Guohong Cao},
  booktitle={IWCMC},
  year={2007}
}
Node compromise is a serious security threat that hinders the successful deployment of large-scale wireless sensor networks. A node compromise often consists of three stages: physically obtaining and compromising the sensors, redeploying the compromised sensors, and compromised nodes launching attacks after their rejoining the network. By far, all the proposed compromise detection schemes address this problem at the third stage. In this paper, we make the first attempt to detect node compromise… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 51 CITATIONS, ESTIMATED 23% COVERAGE

First stage detection of compromised nodes in sensor networks

  • 2010 IEEE Sensors Applications Symposium (SAS)
  • 2010
VIEW 11 EXCERPTS
CITES RESULTS, METHODS & BACKGROUND
HIGHLY INFLUENCED

CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks

  • GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
  • 2009
VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Defense Against Node Compromise in Sensor Network Security

VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

An Enhanced Communication Protocol for Anonymity and Location Privacy in WSN

  • 2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)
  • 2015
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Detection of False Data Distribution Nodes in Wireless Sensor Networks

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2007
2019

CITATION STATISTICS

  • 8 Highly Influenced Citations

  • Averaged 2 Citations per year over the last 3 years

Similar Papers

Loading similar papers…