Java programming with CORBA
Routing with guaranteed delivery in ad hoc wireless networks
DIALM '99 Proceedings of the 3rd international workshop on Discrete algorithms and methods for mobile computing and communications
Leader election algorithms for mobile ad hoc networks
DIALM '00 Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Sensor-based intrusion detection for intra-domain distance-vector routing
Proceedings of the 9th ACM conference on Computer and communications security
STATL: an attack language for state-based intrusion detection
Journal of Computer Security
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
LAD: Localization Anomaly Detection forWireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Synthesis of correct and distributed adaptors for component-based systems: an automatic approach
Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering
Distributed IDSs for enhancing Security in Mobile Wireless Sensor Networks
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Introduction to Automata Theory, Languages, and Computation (3rd Edition)
Introduction to Automata Theory, Languages, and Computation (3rd Edition)
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
An EFSM-based intrusion detection system for ad hoc networks
ATVA'05 Proceedings of the Third international conference on Automated Technology for Verification and Analysis
A distributed intrusion detection approach for secure software architecture
EWSA'05 Proceedings of the 2nd European conference on Software Architecture
Secure location verification using radio broadcast
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
Personal and Ubiquitous Computing
International Journal of Communication Systems
Hi-index | 0.00 |
We present an approach to provide Intrusion Detection Systems (IDS) facilities into Wireless Sensors Networks (WSN). WSNs are usually composed of a large number of low power sensors. They require a careful consumption of the available energy in order to prolong the lifetime of the network. From the security point of view, the overhead added to standard protocols must be as light as possible according to the required security level. Starting from the DESERT tool [14, 16, 25] which has been proposed for component-based software architectures, we derive a new framework that permits to dynamically enforce a set of properties of the sensors behavior. This is accomplished by an IDS specification that is automatically translated into few lines of code installed in the sensors. This realizes a distributed system that locally detects violation of the sensors interactions policies and is able to minimize the information sent among sensors in order to discover attacks across the network.