TY - GEN
T1 - Analysis of methods for detecting compromised nodes and its countermeasures
AU - Zhao, Fangming
AU - Nishide, Takashi
AU - Hori, Yoshiaki
AU - Sakurai, Kouichi
PY - 2013
Y1 - 2013
N2 - The increased application of sensor network introduces new security challenges. In this paper, we analyze the detection methods of compromised nodes and its countermeasure in the sensor network. We first review common attacks in the sensor network application which can compromise a valid, resource-constrained node (or called device). Then, we introduce several standard detection approaches to show their characteristics in different applications of the sensor network. Finally, we summarize and discuss existing countermeasures to the compromised nodes.
AB - The increased application of sensor network introduces new security challenges. In this paper, we analyze the detection methods of compromised nodes and its countermeasure in the sensor network. We first review common attacks in the sensor network application which can compromise a valid, resource-constrained node (or called device). Then, we introduce several standard detection approaches to show their characteristics in different applications of the sensor network. Finally, we summarize and discuss existing countermeasures to the compromised nodes.
UR - http://www.scopus.com/inward/record.url?scp=84874135326&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84874135326&partnerID=8YFLogxK
U2 - 10.1007/978-94-007-5860-5_7
DO - 10.1007/978-94-007-5860-5_7
M3 - Conference contribution
AN - SCOPUS:84874135326
SN - 9789400758599
T3 - Lecture Notes in Electrical Engineering
SP - 53
EP - 60
BT - IT Convergence and Security 2012
T2 - International Conference on IT Convergence and Security, ICITCS 2012
Y2 - 5 December 2012 through 7 December 2012
ER -