Simulating computer systems: techniques and tools
Simulating computer systems: techniques and tools
Denial of Service in Sensor Networks
Computer
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Medium access control with coordinated adaptive sleeping for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
QoS and Energy Consumption in Wireless Sensor Networks Using CSMA/CA
ICW '05 Proceedings of the 2005 Systems Communications
Evaluation of Security Mechanisms in Wireless Sensor Networks
ICW '05 Proceedings of the 2005 Systems Communications
SCUBA: Secure Code Update By Attestation in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
A stream-oriented power management protocol for low duty cycle sensor network applications
EmNets '05 Proceedings of the 2nd IEEE workshop on Embedded Networked Sensors
Detecting Compromised Nodes in Wireless Sensor Networks
SNPD '07 Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Volume 01
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
SRDS '07 Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Event-driven power management for wireless sensor networks
SEUS'07 Proceedings of the 5th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems
Remote software-based attestation for wireless sensors
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Virtual sink rotation: low-energy scalable routing protocol for ubiquitous sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Sensor network security: a survey
IEEE Communications Surveys & Tutorials
Securing wireless sensor networks: a survey
IEEE Communications Surveys & Tutorials
Designing secure sensor networks
IEEE Wireless Communications
Proceedings of the 2011 ACM Symposium on Applied Computing
Scale-free topology evolution for wireless sensor networks
Computers and Electrical Engineering
Hi-index | 0.89 |
Wireless sensor nodes are widely used in many areas, including military operation surveillance, natural phenomenon monitoring, and medical diagnosis data collection. These applications need to store and transmit sensitive or secret data, which requires intrusion detection mechanisms be deployed to ensure sensor node health, as well as to maintain sensor quality of service and survivability. Because wireless sensors have inherent resource constraints, it is crucial to reduce energy consumption due to intrusion detection activities. In this paper by means of a probability model, we analyze the best frequency at which intrusion detection based on code attestation on the sensor node should be performed so that the sensor reliability is maximized by exploiting the trade-off between the energy consumption and intrusion detection effectiveness. When given a set of parameter values characterizing the operational and networking conditions, the system verifier can dynamically set the intrusion detection rate identified by the mathematical model to maximize the sensor reliability and the expected sensor lifetime.