Challenges in Intrusion Detection for Wireless Ad-hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Distributed Detection of Node Replication Attacks in Sensor Networks
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Securing Distributed Wireless Sensor Networks: Issues and Guidelines
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing - Vol 2 - Workshops - Volume 02
Anomaly intrusion detection in wireless sensor networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Designing secure sensor networks
IEEE Wireless Communications
IEEE Communications Magazine
Hi-index | 0.00 |
The large deployment of wireless sensor networks (WSNs) increases their exposure to intrusions on sensor nodes. One of the most challenging issues is how to detect compromised or malicious nodes. Our goal in this paper is to review different techniques for detecting malicious nodes in WSNs and introducing a new system that we call HyPIDS. The main idea is using additional sensor nodes, called 'monitor nodes', inserted and distributed into the network to detect malicious nodes so that they monitor the propagated messages of common sensors through the network. We have proposed a distributed scheme by applying aggregator nodes but since we just work on monitor nodes at the simulation phase, we used a decentralised approach. We have modelled the solution with Petri nets (PNs). Also, the decentralised approach and detection of malicious nodes has been simulated with a new Java-based tool called SIDnet which supports heterogeneous sensor networks.