Security evaluation methodology for intrusion recovery protocols in wireless sensor networks

  • Authors:
  • Eliana Stavrou;Andreas Pitsillides

  • Affiliations:
  • University of Cyprus, Nicosia, Cyprus;University of Cyprus, Nicosia, Cyprus

  • Venue:
  • Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Researchers have designed intrusion recovery protocols in Wireless Sensor Networks (WSN) with the aim of restoring compromised services and promoting a secure and reliable environment in WSNs. Currently, evaluation frameworks in WSNs have been proposed in a generic security context and do not constitute a representative assessment of intrusion recovery protocols. This paper proposes an evaluation methodology to aid the evaluation and comparison of intrusion recovery protocols in WSNs. The methodology defines the intrusion recovery protocol aspects that should be evaluated using a number of evaluation criteria and guides researchers in identifying the evaluation direction they should follow.