A Survey on Detecting Compromised Nodes in Wireless Sensor Networks

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
The wireless sensor networks are popular and frequently used in many applications. The WSN are deployed in open and unprotected environment. The sensor nodes have limited resources and communication capability so each node is easily captured by an adversary and launching several malicious software inside the network. There are number of cryptographic and authentication protocols have been proposed to protect these networks from outsider attack but fail to protect them from insider attack. In this paper, the authors surveyed about the intrusion detection schemes in WSN.
Download Now

Find By Topic