Provided by: International Journal of Computer Science and Information Technologies
Date Added: Mar 2012
In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, detection and isolation of the same intruder or its clones may have to be conducted repeatedly, wasting scarce network resources. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as attackers can reprogram the sensor to act on their behalf. In the case of sensors, the task of verifying the integrity of memory contents is difficult as physical access to the sensors is often infeasible.