Effective Identification of the Intruders and Modifiers in Wireless Sensor Networks
Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multi-hop sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks, but very few can effectively and efficiently identify the intruders. To address this problem, the authors propose a simple yet effective scheme, which can identify misbehaving forwarders that drop or modify packets. In Wireless Sensor Network, sensors at different locations can generate streaming/discrete data, which can be analyzed in real-time/Non real-time to identify events of interest. A sensor node is often placed in an unfriendly environment to perform the monitoring and data collection tasks. When it is unfriendly environment, node may subject to compromise.