A Strategic Approach for Bypassing the Intruder and Sending Data to Destination Using Three -Tier Framework in Sensor Networks

Provided by: International Journal of Computer Science and Information Technologies
Topic: Networking
Format: PDF
In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, detection and isolation of the same intruder or its clones may have to be conducted repeatedly, wasting scarce network resources. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in these settings, as attackers can reprogram the sensor to act on their behalf. In the case of sensors, the task of verifying the integrity of memory contents is difficult as physical access to the sensors is often infeasible.

Find By Topic