In Wireless Sensor Networks Catching Packet Droppers and Modifiers

Download Now
Provided by: International Journal of Research and Computational Technology (IJRCT)
Topic: Security
Format: PDF
Though destructive to network functions, insider attackers are not detectable with only the classic cryptography based techniques. Many mission-critic sensor network applications demand an effective, light, flexible algorithm for internal adversary identification with only localized information available. The insider attacker detection scheme proposed in this paper meets all the requirements by exploring the spatial correlation existent among the networking behaviors of sensors in close proximity. The authors' work is exploratory in that the proposed algorithm considers multiple attributes simultaneously in node behavior evaluation, with no requirement on a prior knowledge about normal/malicious sensor activities.
Download Now

Find By Topic