Loading…

Maintaining functional module integrity in sensor networks

Security is one of the top concerns when sensors are deployed in hostile environments for military applications. Attacks on sensor nodes can be categorized into two types: attacks through radio signals to alter the functionalities of sensors and physical attacks; which may completely damage sensors....

Full description

Saved in:
Bibliographic Details
Main Authors: Pongaliur, K., Chen Wang, Li Xiao
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Security is one of the top concerns when sensors are deployed in hostile environments for military applications. Attacks on sensor nodes can be categorized into two types: attacks through radio signals to alter the functionalities of sensors and physical attacks; which may completely damage sensors. We show that the former is easier to launch and more disguised, thus more hazardous. The layered framework proposed in this paper is specially designed to defend against the first type of attacks. Different from precious reputation-based approaches or data mining technologies which usually incur large communication and computation overhead, our solution only involves localized computation which is less intensive, thus can be implemented on-board with little burden on current MICA2 platforms. Besides identifying malicious nodes, our solution can also recover the normal functionalities of sensors, which have been altered by malicious radio signals
ISSN:2155-6806
2155-6814
DOI:10.1109/MAHSS.2005.1542874