Analysis of methods for detecting compromised nodes and its countermeasures

Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The increased application of sensor network introduces new security challenges. In this paper, we analyze the detection methods of compromised nodes and its countermeasure in the sensor network. We first review common attacks in the sensor network application which can compromise a valid, resource-constrained node (or called device). Then, we introduce several standard detection approaches to show their characteristics in different applications of the sensor network. Finally, we summarize and discuss existing countermeasures to the compromised nodes.

Original languageEnglish
Title of host publicationIT Convergence and Security 2012
Pages53-60
Number of pages8
Volume215 LNEE
DOIs
Publication statusPublished - Feb 26 2013
EventInternational Conference on IT Convergence and Security, ICITCS 2012 - Pyeong Chang, Korea, Republic of
Duration: Dec 5 2012Dec 7 2012

Publication series

NameLecture Notes in Electrical Engineering
Volume215 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Other

OtherInternational Conference on IT Convergence and Security, ICITCS 2012
CountryKorea, Republic of
CityPyeong Chang
Period12/5/1212/7/12

All Science Journal Classification (ASJC) codes

  • Industrial and Manufacturing Engineering

Fingerprint Dive into the research topics of 'Analysis of methods for detecting compromised nodes and its countermeasures'. Together they form a unique fingerprint.

  • Cite this

    Zhao, F., Nishide, T., Hori, Y., & Sakurai, K. (2013). Analysis of methods for detecting compromised nodes and its countermeasures. In IT Convergence and Security 2012 (Vol. 215 LNEE, pp. 53-60). (Lecture Notes in Electrical Engineering; Vol. 215 LNEE). https://doi.org/10.1007/978-94-007-5860-5_7