BEHAVIORAL MODEL FOR DETECTION OF COMPROMISED NODES IN WSN
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
B. Parno, A. Perrig, and V.D. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. IEEE Symp. Security and Privacy (S&P), May 2005
Mr. Manish M Patel, Dr. Akshai Aggarwal, "Security Attacks in Wireless Sensor Networks: A Survey," International Conference on Intelligent Systems and Signal Processing (ISSP), pp. 329 - 333, 2013.
F. Li and J. Wu, “Mobility Reduces Uncertainty in MANET,†Proc. IEEE INFOCOM, May 2007.
S. Ganeriwal and M. Srivastava, "Reputation-Based Framework for High Integrity Sensor Networks," Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN), Oct. 2004
Y. Sun, Z. Han, W. Yu, and K. Liu, "A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense against Attacks," Proc. IEEE INFOCOM, Apr. 2006.
A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, “SWATT:SoftWare-Based Attestation for Embedded Devices,†Proc. IEEE Symp. Security and Privacy (S & P), May 2004.
T. Abuhmed, N. Nyamaa, and D. Nyang, “Software-Based Remote Code Attestation in Wireless Sensor Network,†Proc. of IEEE GLOBECOM, December. 2009.
T. Park and K. G. Shin, “Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks,†IEEE Trans.Mobile Computing, May/June 2005, vol. 4, no. 3, pp. 297-309.
Y. Yang, X. Wang, S. Zhu, and G. Cao, "Distributed Software-Based Attestation for Node Compromise Detection in Sensor Networks," Proc. IEEE 26th Int’l Symp. Reliable Distributed Systems (SRDS), Oct. 2007.
Jun-Won Ho, Matthew Wright, and Sajal K. Das, â€ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing,†IEEE Transactions on Dependable and Secure Computing, July/August 2012, vol. 9, no. 4, pp. 494-511.
Manyam Thaile, and O.B.V Ramanaiah, "Node Compromise Detection Based on NodeTrust
in Wireless Sensor Networks," An IEEE International Conference on Computer Communication and Informatics (ICCCI), Jan. 07 – 09, 2016, pp. 193-197, Coimbatore, INDIA.
Manyam Thaile, and O.B.V Ramanaiah, "Node Compromise Detection Based on Parameter Grouping in Wireless Sensor Networks," SECURWARE 2016:The Tenth International Conference on Emerging Security Information, Systems and Technologies, July. 24 – 28, 2016, pp. 14-20, ISBN: 978-1-61208-493-0, Nice, France.
Yan Lindsay Sun , Zhu Han , Wei Yu , K. J. Ray Liu , "A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks," IEEE INFOCOM, 2006.
Thomas M. Cover, Joy A. Thomas, "Elements of Information Theory," 2006.
Haroon Rashid, "Localization in Wireless Sensor Networks," Thesis, july,2013.
G. Padmavathi and M. D. Shanmugapriya, "A survey of attacks, security mechanisms and challenges in wireless sensor networks," Int. J. Comput. Sci., vol. 4, no. 1, pp. 1–9, Aug. 2009.
R. Rivest, "The MD5 Message-Digest Algorithm," MIT Laboratory for Computer Science and RSA Data Security Inc, 1992.
Teerawat Issariyakul, Ekram Hossain, "Introduction to Network Simulator NS2",Textbook,2008.