Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
An adaptive energy-efficient MAC protocol for wireless sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Sensor network-based countersniper system
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Versatile low power media access for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Anomaly intrusion detection in wireless sensor networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique
ICNS '07 Proceedings of the Third International Conference on Networking and Services
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
The promise, and limitations, of gossip protocols
ACM SIGOPS Operating Systems Review - Gossip-based computer networking
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
On Fundamental Limitations of Proving Data Theft
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
Data theft in wireless sensor networks could prove disastrous and most of the time gets undetected due to no apparent abnormal behavior of malicious nodes. To counter such attacks, we propose an anomaly based distributed data-theft detection protocol. Our approach works at the MAC layer by effectively measuring the MAC control packets. In this paper, we present a novel detection metric, a centralized and a gossip-based distributed protocol whereby a network can self-heal itself of such malicious nodes. Our performance evaluation defines how we measure the rate of detection and false positives rate and shows that our approach to detect malicious nodes is reliable, inexpensive and accurate.