Reaching Agreement in the Presence of Faults
Journal of the ACM (JACM)
Password authentication with insecure communication
Communications of the ACM
Negotiation-based protocols for disseminating information in wireless sensor networks
Wireless Networks - Selected Papers from Mobicom'99
Taming the underlying challenges of reliable multihop routing in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Anomaly intrusion detection in wireless sensor networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Intrusion detection of sinkhole attacks in wireless sensor networks
ALGOSENSORS'07 Proceedings of the 3rd international conference on Algorithmic aspects of wireless sensor networks
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Wormholes no more? localized wormhole detection and prevention in wireless networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
Exploiting routing tree construction in CTP
WISA'11 Proceedings of the 12th international conference on Information Security Applications
People-centric sensing in assistive healthcare: Privacy challenges and directions
Security and Communication Networks
A hidden Markov model based intrusion detection system for wireless sensor networks
International Journal of Critical Computer-Based Systems
Spy-Sense: spyware tool for executing stealthy exploits against sensor networks
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Journal of Computer and System Sciences
Hi-index | 0.00 |
We consider the problem of cooperative intrusion detection in wireless sensor networks where the nodes are equipped with local detector modules and have to identify the intruder in a distributed fashion. The detector modules issue suspicions about an intrusion in the sensor's neighborhood. We formally define the problem of intrusion detection and identify necessary and sufficient conditions for its solvability. Based on these conditions we develop a generic algorithm for intrusion detection and present simulations and experiments which show the effectiveness of our approach.