Data structures and network algorithms
Data structures and network algorithms
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A distributed monitoring mechanism for wireless sensor networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
System Health and Intrusion Monitoring Using a Hierarchy of Constraints
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Constant-time distributed dominating set approximation
Proceedings of the twenty-second annual symposium on Principles of distributed computing
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Hi-index | 0.00 |
Sensor networks have increasingly become the subject of intense scientific interest over the past few years. In this work we focus on detecting intrusions in sensor networks. The intrusion detection community has been focusing mainly on wired networks. But techniques geared towards wireline networks would not suffice for a sensor environment because of the constraints associated with such networks. In this paper we consider arbitrary sized sensor networks and propose algorithms to improve the detection rates by intelligently enabling the intrusion detection functionality on particular sensor nodes. The proposed algorithms, based on the concepts of minimum cut-set and minimum dominating set, allow for a distributed implementation. The performance of the algorithms in identifying intrusions using signature based detection techniques is studied via simulations.