A distributed monitoring mechanism for wireless sensor networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Impala: a middleware system for managing autonomic, parallel sensor systems
Proceedings of the ninth ACM SIGPLAN symposium on Principles and practice of parallel programming
Poster abstract: BTnodes -- a distributed platform for sensor nodes
Proceedings of the 1st international conference on Embedded networked sensor systems
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
JiST: an efficient approach to simulation using virtual machines: Research Articles
Software—Practice & Experience
MNP: Multihop Network Reprogramming Service for Sensor Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Distributed IDSs for enhancing Security in Mobile Wireless Sensor Networks
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Detection and Repair of Software Errors in Hierarchical Sensor Networks
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
Designing secure sensor networks
IEEE Wireless Communications
A new method for intrusion detection on hierarchical wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
On attack-resilient wireless sensor networks with novel recovery strategies
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Proactive reconfiguration of wireless sensor networks
Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
A survivability model in wireless sensor networks
Computers & Mathematics with Applications
Hi-index | 0.00 |
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faulty nodes in order to take appropriate countermeasures, thus limiting the damage caused by adversaries as well as by hard or software faults. So far, however, once detected, misbehaving nodes have just been isolated from the rest of the sensor network and hence are no longer usable by running applications. In the presence of an adversary or software faults, this proceeding will inevitably lead to an early and complete loss of the whole network.For this reason, we propose to no longer expel misbehaving nodes, but to recover them into normal operation. In this paper, we address this problem and present a formal specification of what is considered a secure and correct node recovery algorithm together with a distributed algorithm that meets these properties. We discuss its requirements on the soft- and hardware of a node and show how they can be fulfilled with current and upcoming technologies. The algorithm is evaluated analytically as well as by means of extensive simulations, and the findings are compared to the outcome of a real implementation for the BTnode sensor platform. The results show that recovering sensor nodes is an expensive, though feasible and worthwhile task. Moreover, the proposed program code update algorithm is not only secure but also fair and robust.