Analysis of methods for detecting compromised nodes and its countermeasures

Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The increased application of sensor network introduces new security challenges. In this paper, we analyze the detection methods of compromised nodes and its countermeasure in the sensor network. We first review common attacks in the sensor network application which can compromise a valid, resource-constrained node (or called device). Then, we introduce several standard detection approaches to show their characteristics in different applications of the sensor network. Finally, we summarize and discuss existing countermeasures to the compromised nodes.

Original languageEnglish
Title of host publicationIT Convergence and Security 2012
Pages53-60
Number of pages8
Volume215 LNEE
DOIs
Publication statusPublished - Feb 26 2013
EventInternational Conference on IT Convergence and Security, ICITCS 2012 - Pyeong Chang, Korea, Republic of
Duration: Dec 5 2012Dec 7 2012

Publication series

NameLecture Notes in Electrical Engineering
Volume215 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Other

OtherInternational Conference on IT Convergence and Security, ICITCS 2012
CountryKorea, Republic of
CityPyeong Chang
Period12/5/1212/7/12

Fingerprint

Sensor networks

All Science Journal Classification (ASJC) codes

  • Industrial and Manufacturing Engineering

Cite this

Zhao, F., Nishide, T., Hori, Y., & Sakurai, K. (2013). Analysis of methods for detecting compromised nodes and its countermeasures. In IT Convergence and Security 2012 (Vol. 215 LNEE, pp. 53-60). (Lecture Notes in Electrical Engineering; Vol. 215 LNEE). https://doi.org/10.1007/978-94-007-5860-5_7

Analysis of methods for detecting compromised nodes and its countermeasures. / Zhao, Fangming; Nishide, Takashi; Hori, Yoshiaki; Sakurai, Kouichi.

IT Convergence and Security 2012. Vol. 215 LNEE 2013. p. 53-60 (Lecture Notes in Electrical Engineering; Vol. 215 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zhao, F, Nishide, T, Hori, Y & Sakurai, K 2013, Analysis of methods for detecting compromised nodes and its countermeasures. in IT Convergence and Security 2012. vol. 215 LNEE, Lecture Notes in Electrical Engineering, vol. 215 LNEE, pp. 53-60, International Conference on IT Convergence and Security, ICITCS 2012, Pyeong Chang, Korea, Republic of, 12/5/12. https://doi.org/10.1007/978-94-007-5860-5_7
Zhao F, Nishide T, Hori Y, Sakurai K. Analysis of methods for detecting compromised nodes and its countermeasures. In IT Convergence and Security 2012. Vol. 215 LNEE. 2013. p. 53-60. (Lecture Notes in Electrical Engineering). https://doi.org/10.1007/978-94-007-5860-5_7
Zhao, Fangming ; Nishide, Takashi ; Hori, Yoshiaki ; Sakurai, Kouichi. / Analysis of methods for detecting compromised nodes and its countermeasures. IT Convergence and Security 2012. Vol. 215 LNEE 2013. pp. 53-60 (Lecture Notes in Electrical Engineering).
@inproceedings{d6d6bf619fbc47d48d0f77affc774b51,
title = "Analysis of methods for detecting compromised nodes and its countermeasures",
abstract = "The increased application of sensor network introduces new security challenges. In this paper, we analyze the detection methods of compromised nodes and its countermeasure in the sensor network. We first review common attacks in the sensor network application which can compromise a valid, resource-constrained node (or called device). Then, we introduce several standard detection approaches to show their characteristics in different applications of the sensor network. Finally, we summarize and discuss existing countermeasures to the compromised nodes.",
author = "Fangming Zhao and Takashi Nishide and Yoshiaki Hori and Kouichi Sakurai",
year = "2013",
month = "2",
day = "26",
doi = "10.1007/978-94-007-5860-5_7",
language = "English",
isbn = "9789400758599",
volume = "215 LNEE",
series = "Lecture Notes in Electrical Engineering",
pages = "53--60",
booktitle = "IT Convergence and Security 2012",

}

TY - GEN

T1 - Analysis of methods for detecting compromised nodes and its countermeasures

AU - Zhao, Fangming

AU - Nishide, Takashi

AU - Hori, Yoshiaki

AU - Sakurai, Kouichi

PY - 2013/2/26

Y1 - 2013/2/26

N2 - The increased application of sensor network introduces new security challenges. In this paper, we analyze the detection methods of compromised nodes and its countermeasure in the sensor network. We first review common attacks in the sensor network application which can compromise a valid, resource-constrained node (or called device). Then, we introduce several standard detection approaches to show their characteristics in different applications of the sensor network. Finally, we summarize and discuss existing countermeasures to the compromised nodes.

AB - The increased application of sensor network introduces new security challenges. In this paper, we analyze the detection methods of compromised nodes and its countermeasure in the sensor network. We first review common attacks in the sensor network application which can compromise a valid, resource-constrained node (or called device). Then, we introduce several standard detection approaches to show their characteristics in different applications of the sensor network. Finally, we summarize and discuss existing countermeasures to the compromised nodes.

UR - http://www.scopus.com/inward/record.url?scp=84874135326&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84874135326&partnerID=8YFLogxK

U2 - 10.1007/978-94-007-5860-5_7

DO - 10.1007/978-94-007-5860-5_7

M3 - Conference contribution

SN - 9789400758599

VL - 215 LNEE

T3 - Lecture Notes in Electrical Engineering

SP - 53

EP - 60

BT - IT Convergence and Security 2012

ER -