2016
DOI: 10.1109/access.2016.2594478
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…If has capability C-3 then he will also have C-4, which means that the session key and authorized public keys are exposed. Therefore, the compromised node must be detected and exiled from the system, for which several optional mechanisms can be used [ 32 , 33 , 34 ]. For simplicity, the details of these mechanisms are not discussed in this manuscript.…”
Section: Security Analysismentioning
confidence: 99%
“…If has capability C-3 then he will also have C-4, which means that the session key and authorized public keys are exposed. Therefore, the compromised node must be detected and exiled from the system, for which several optional mechanisms can be used [ 32 , 33 , 34 ]. For simplicity, the details of these mechanisms are not discussed in this manuscript.…”
Section: Security Analysismentioning
confidence: 99%
“…Node capture should be detected as soon as possible to reduce the damage caused by the captured nodes to the network. Ideally, the captured nodes should be discovered as soon as the node capture occurs and be isolated from the network communication [15] . Such a node discovery action corresponds to the early detection of the physical node capture attack in the first stage.…”
Section: Introductionmentioning
confidence: 99%
“…For example, compromising of the node, energy consumption, and routing set has emerged in recent years. By using the node compromise, which is one of the major issues in WSN, an attacker can capture physically and compromise stored data or software [3]. In addition, compromise of energy consumption and routing set that impede smooth data transmission are also remained as challenges to be solved [4], [5].…”
Section: Introductionmentioning
confidence: 99%