Computer Science ›› 2011, Vol. 38 ›› Issue (4): 97-99.

Previous Articles     Next Articles

Research on Detection Methods for Insidious Attack of Wireless Sensor Networks

WANG Liang-min,LI Fei,XIONG Shu-ming,ZHANG Jian-ming   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Insidious attack becomes more and more important to the security question of wireless sensor network with the developments of its hardware and software. A comprehensive survey on the detection methods for this attack was presented in this paper. Firstly, these methods were introduced in 3 classes: detection on attack behaviors, compromised nodes and replica nodes. Then it was pointed out that the detection assumption of pre-known attack behavior, outnumtiered benign nodes or absolutely secure sink or base station bottlenecks the application of these methods. Furthermore,the issues about attack detection in the mobile wireless sensor networks were introduced, and then the challenges and advantages about mobile nodes over the attack detection for wireless sensor network were discussed. Finally, the possitile developments of methods for detecting insidious attack were presented.

Key words: Wireless sensor networks,Insidious attack,Mobile nodes,Attack detection

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!