2010
DOI: 10.1007/s11227-010-0508-x
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic camouflage event based malicious node detection architecture

Abstract: Compromised sensor nodes may collude to segregate a specific region of the sensor network preventing event reporting packets in this region from reaching the basestation. Additionally, they can cause skepticism over all data collected. Identifying and segregating such compromised nodes while identifying the type of attack with a certain confidence level is critical to the smooth functioning of a sensor network. Existing work specializes in preventing or identifying a specific type of attack and lacks a unified… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Event based malicious node detection [5] architecture is proactive that uses camouflage events generated by mobile nodes to detect malicious nodes. While the mobile node starts the route designed by the base station and it stops at the designated location and it generates camouflage event.…”
Section: Related Workmentioning
confidence: 99%
“…Event based malicious node detection [5] architecture is proactive that uses camouflage events generated by mobile nodes to detect malicious nodes. While the mobile node starts the route designed by the base station and it stops at the designated location and it generates camouflage event.…”
Section: Related Workmentioning
confidence: 99%
“…The fourth paper, "Dynamic Camouflage Event based Malicious Node Detection Architecture," [4] presents the Dynamic Camouflage Event-based malicious Node Detection Architecture (D-CENDA) for detecting malicious nodes in the sensor networks. D-CENDA improves CENDA by using dynamic feedback from the network in the form of sensor node usage for event detection and packet propagation.…”
mentioning
confidence: 99%