Security

Dynamic Camouflage Event Based Malicious Node Detection Architecture

Download Now Free registration required

Executive Summary

Compromised sensor nodes may collude to segregate a specific region of the sensor network preventing event reporting packets in this region from reaching the base-station. Additionally, they can cause skepticism over all data collected. Identifying and segregating such compromised nodes while identifying the type of attack with a certain confidence level is critical to the smooth functioning of a sensor network. Existing work specializes in preventing or identifying a specific type of attack and lacks a unified architecture to identify multiple attack types.

  • Format: PDF
  • Size: 1014.56 KB