Distributed detection in wireless sensor networks

Sheng-Tzong Cheng, Szu Yun Li, Chia Mei Chen

研究成果: Conference contribution

3 引文 斯高帕斯(Scopus)

摘要

Wireless sensor networks (WSNs) usually are applied in military systems, surveillance systems, etc. Since WSNs always are deployed in open environments, the security mechanisms in WSNs are very important. Although there are many security mechanisms in WSNs, such as intrusion detection and fault tolerant system, few of them are proposed to detect compromised sensors. In this paper, we propose an application-independent detection model, distributed cross-layer detection model (DCD), making use of a distributed mechanism and the information of each layer in the communication protocol to detect which sensors were already compromised. Due to the characteristics of low power, low computation ability, low storage space, simplicity and high-efficiency is our design goal. Only when compromised sensors can be detected, the WSNs could be safer in practice.

原文English
主出版物標題Proceedings - 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, In conjunction with 2nd IEEE/ACIS Int. Workshop on e-Activity, IEEE/ACIS IWEA 2008
頁面401-406
頁數6
DOIs
出版狀態Published - 2008 9月 15
事件7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008 - Portland, OR, United States
持續時間: 2008 5月 142008 5月 16

出版系列

名字Proceedings - 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, In conjunction with 2nd IEEE/ACIS Int. Workshop on e-Activity, IEEE/ACIS IWEA 2008

Other

Other7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008
國家/地區United States
城市Portland, OR
期間08-05-1408-05-16

All Science Journal Classification (ASJC) codes

  • 電腦科學(全部)
  • 資訊系統

指紋

深入研究「Distributed detection in wireless sensor networks」主題。共同形成了獨特的指紋。

引用此