2008
DOI: 10.1016/j.istr.2008.10.011
|View full text |Cite
|
Sign up to set email alerts
|

On handling insider attacks in wireless sensor networks

Abstract: Ehrenwörtliche Erklärung 2Hiermit erkläre ich, dass ich die vorliegende Arbeit, mit Ausnahme der in ihr ausdrücklich genannten Hilfen, selbstständig verfasst habe.1 gemäß §20 Abs. 3 der Promotionsordnung der TU Darmstadt 2 gemäß §9 Abs. 1 der Promotionsordnung der TU Darmstadt AbstractWireless sensor networks are a relatively new technology for information gathering and processing. A sensor network usually consists of many, resource constrained sensor nodes. These nodes perform measurements of some physical p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(22 citation statements)
references
References 257 publications
(301 reference statements)
0
22
0
Order By: Relevance
“…By considering misbehavior history, it is difficult to a malicious node to recover its trust value as long as it persists in its misbehavior. Simulation results show that O 2 Trust is an efficient and on-off attack-resistant trust model. However, how to select the proper value of the weight and the defined threshold is still a challenge problem, which we plan to address in our future research endeavors.…”
Section: Resultsmentioning
confidence: 98%
See 3 more Smart Citations
“…By considering misbehavior history, it is difficult to a malicious node to recover its trust value as long as it persists in its misbehavior. Simulation results show that O 2 Trust is an efficient and on-off attack-resistant trust model. However, how to select the proper value of the weight and the defined threshold is still a challenge problem, which we plan to address in our future research endeavors.…”
Section: Resultsmentioning
confidence: 98%
“…However, building a robust trust model is very challenging, because malicious nodes participate in the behavior rating process and can distort the trust value by cheating. In this paper, we proposed O 2 Trust, a trust model to mitigate on-off attack. O 2 Trust adopts the Penalty Policy against the misbehavior history of each node in the network.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…By physically accessing the sensor nodes an intruder can fully control the operations of few sensor nodes. Compromising a node is normally contemplated as one of a most challenging problem in WSN security [11].…”
Section: Introductionmentioning
confidence: 99%