Computer Science – Cryptography and Security
Scientific paper
2011-11-02
Computer Science
Cryptography and Security
15 pages, 1 figure; ISSN: 0973-8215; International Journal of Information Processing, Vol. 2, No. 3, October, 2008. arXiv admi
Scientific paper
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Unfortunately, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes and intentional compromise of nodes by an insider attack in a WSN pose particularly difficult challenges to security engineers as these attacks cannot be defended by traditional cryptography-based mechanisms. In this paper, a security solution is proposed for detecting compromised and faulty nodes in a WSN. The mechanism also isolates a compromised node from the network so that it cannot participate in any network activity. The proposed mechanism is based on misbehavior classification, behaviour monitoring and trust management. It involves minimum computation and communication overhead and is ideally suited for a resource-constrained, high-integrity WSN.
Krishna Sripad
Sen Jaydip
No associations
LandOfFree
An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-327493