Download Now Free registration required
Compromised sensor nodes may collude to segregate a specific region of the sensor network preventing event reporting packets in this region from reaching the base-station. Additionally, they can cause skepticism over all data collected. Identifying and segregating such compromised nodes while identifying the type of attack with a certain confidence level is critical to the smooth functioning of a sensor network. Existing work specializes in preventing or identifying a specific type of attack and lacks a unified architecture to identify multiple attack types.
- Format: PDF
- Size: 1014.56 KB