O'Reilly logo

Handbook on Securing Cyber-Physical Critical Infrastructure by Nan Zhang, Krishna Kant, Sajal K Das

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11

Node Compromise Detection in Wireless Sensor Networks

Jun-Won Ho and Sajal K. Das

11.1 Introduction

In many applications involving wireless sensor networks, the network operator usually deploys sensor nodes in unattended fashion and remotely controls them. Hence, an adversary is able to compromise sensor nodes by exploiting this unattended nature and further force the compromised nodes to launch various types of attacks such as denial-of-service attacks, routing disruption and false data injection attacks, and network service disruption attacks [13]. Given that compromised nodes are the main sources of attacks, an attacker may adopt the limited node compromise strategy in which he physically captures sensor nodes and extracts their ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required