Analysis of methods for detecting compromised nodes and its countermeasures

Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai

研究成果: Chapter in Book/Report/Conference proceedingConference contribution

抄録

The increased application of sensor network introduces new security challenges. In this paper, we analyze the detection methods of compromised nodes and its countermeasure in the sensor network. We first review common attacks in the sensor network application which can compromise a valid, resource-constrained node (or called device). Then, we introduce several standard detection approaches to show their characteristics in different applications of the sensor network. Finally, we summarize and discuss existing countermeasures to the compromised nodes.

本文言語英語
ホスト出版物のタイトルIT Convergence and Security 2012
ページ53-60
ページ数8
DOI
出版ステータス出版済み - 2013
イベントInternational Conference on IT Convergence and Security, ICITCS 2012 - Pyeong Chang, 大韓民国
継続期間: 12 5 201212 7 2012

出版物シリーズ

名前Lecture Notes in Electrical Engineering
215 LNEE
ISSN(印刷版)1876-1100
ISSN(電子版)1876-1119

その他

その他International Conference on IT Convergence and Security, ICITCS 2012
Country大韓民国
CityPyeong Chang
Period12/5/1212/7/12

All Science Journal Classification (ASJC) codes

  • Industrial and Manufacturing Engineering

フィンガープリント 「Analysis of methods for detecting compromised nodes and its countermeasures」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル