Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks
Title | Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Wei Min, Keecheon Kim |
Conference Name | Information Networking (ICOIN), 2014 International Conference on |
Date Published | Feb |
Keywords | all-channel analyzer, data communication, data traffic detection, expert intrusion detection analysis system, Intrusion detection, intrusion tolerance, intrusion tolerance architecture, intrusion tolerance mechanisms, Monitoring, Protocols, re-route detection, redundant node, redundant nodes, Routing, security, telecommunication channels, telecommunication network routing, telecommunication security, telecommunication traffic, wireless networks, Wireless sensor networks |
Abstract | Wireless sensor networks extend people's ability to explore, monitor, and control the physical world. Wireless sensor networks are susceptible to certain types of attacks because they are deployed in open and unprotected environments. Novel intrusion tolerance architecture is proposed in this paper. An expert intrusion detection analysis system and an all-channel analyzer are introduced. A proposed intrusion tolerance scheme is implemented. Results show that this scheme can detect data traffic and re-route it to a redundant node in the wireless network, prolong the lifetime of the network, and isolate malicious traffic introduced through compromised nodes or illegal intrusions. |
URL | http://ieeexplore.ieee.org/document/6799679/ |
DOI | 10.1109/ICOIN.2014.6799679 |
Citation Key | 6799679 |
- re-route detection
- wireless sensor networks
- wireless networks
- telecommunication traffic
- telecommunication security
- telecommunication network routing
- telecommunication channels
- security
- Routing
- redundant nodes
- redundant node
- all-channel analyzer
- Protocols
- Monitoring
- intrusion tolerance mechanisms
- intrusion tolerance architecture
- intrusion tolerance
- Intrusion Detection
- expert intrusion detection analysis system
- data traffic detection
- data communication