Visible to the public Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks

TitleIntrusion tolerance mechanisms using redundant nodes for wireless sensor networks
Publication TypeConference Paper
Year of Publication2014
AuthorsWei Min, Keecheon Kim
Conference NameInformation Networking (ICOIN), 2014 International Conference on
Date PublishedFeb
Keywordsall-channel analyzer, data communication, data traffic detection, expert intrusion detection analysis system, Intrusion detection, intrusion tolerance, intrusion tolerance architecture, intrusion tolerance mechanisms, Monitoring, Protocols, re-route detection, redundant node, redundant nodes, Routing, security, telecommunication channels, telecommunication network routing, telecommunication security, telecommunication traffic, wireless networks, Wireless sensor networks
Abstract

Wireless sensor networks extend people's ability to explore, monitor, and control the physical world. Wireless sensor networks are susceptible to certain types of attacks because they are deployed in open and unprotected environments. Novel intrusion tolerance architecture is proposed in this paper. An expert intrusion detection analysis system and an all-channel analyzer are introduced. A proposed intrusion tolerance scheme is implemented. Results show that this scheme can detect data traffic and re-route it to a redundant node in the wireless network, prolong the lifetime of the network, and isolate malicious traffic introduced through compromised nodes or illegal intrusions.

URLhttp://ieeexplore.ieee.org/document/6799679/
DOI10.1109/ICOIN.2014.6799679
Citation Key6799679