Chapter 11

Node Compromise Detection in Wireless Sensor Networks

Jun-Won Ho and Sajal K. Das

11.1 Introduction

In many applications involving wireless sensor networks, the network operator usually deploys sensor nodes in unattended fashion and remotely controls them. Hence, an adversary is able to compromise sensor nodes by exploiting this unattended nature and further force the compromised nodes to launch various types of attacks such as denial-of-service attacks, routing disruption and false data injection attacks, and network service disruption attacks [13]. Given that compromised nodes are the main sources of attacks, an attacker may adopt the limited node compromise strategy in which he physically captures sensor nodes and extracts their ...

Get Handbook on Securing Cyber-Physical Critical Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.