TY - GEN
T1 - Distributed detection in wireless sensor networks
AU - Cheng, Sheng-Tzong
AU - Li, Szu Yun
AU - Chen, Chia Mei
PY - 2008/9/15
Y1 - 2008/9/15
N2 - Wireless sensor networks (WSNs) usually are applied in military systems, surveillance systems, etc. Since WSNs always are deployed in open environments, the security mechanisms in WSNs are very important. Although there are many security mechanisms in WSNs, such as intrusion detection and fault tolerant system, few of them are proposed to detect compromised sensors. In this paper, we propose an application-independent detection model, distributed cross-layer detection model (DCD), making use of a distributed mechanism and the information of each layer in the communication protocol to detect which sensors were already compromised. Due to the characteristics of low power, low computation ability, low storage space, simplicity and high-efficiency is our design goal. Only when compromised sensors can be detected, the WSNs could be safer in practice.
AB - Wireless sensor networks (WSNs) usually are applied in military systems, surveillance systems, etc. Since WSNs always are deployed in open environments, the security mechanisms in WSNs are very important. Although there are many security mechanisms in WSNs, such as intrusion detection and fault tolerant system, few of them are proposed to detect compromised sensors. In this paper, we propose an application-independent detection model, distributed cross-layer detection model (DCD), making use of a distributed mechanism and the information of each layer in the communication protocol to detect which sensors were already compromised. Due to the characteristics of low power, low computation ability, low storage space, simplicity and high-efficiency is our design goal. Only when compromised sensors can be detected, the WSNs could be safer in practice.
UR - http://www.scopus.com/inward/record.url?scp=51349161752&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=51349161752&partnerID=8YFLogxK
U2 - 10.1109/ICIS.2008.15
DO - 10.1109/ICIS.2008.15
M3 - Conference contribution
AN - SCOPUS:51349161752
SN - 9780769531311
T3 - Proceedings - 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, In conjunction with 2nd IEEE/ACIS Int. Workshop on e-Activity, IEEE/ACIS IWEA 2008
SP - 401
EP - 406
BT - Proceedings - 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, In conjunction with 2nd IEEE/ACIS Int. Workshop on e-Activity, IEEE/ACIS IWEA 2008
T2 - 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008
Y2 - 14 May 2008 through 16 May 2008
ER -