Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Computer Engineering
Detecting Compromised Nodes In Wireless Sensor Networks, Mary Lisa Mathews
Detecting Compromised Nodes In Wireless Sensor Networks, Mary Lisa Mathews
Electrical & Computer Engineering Theses & Dissertations
While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are utilized have sensitive data. Therefore, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if measures are not taken to deal with this event. There have been many approaches researched to tackle the issue. In this thesis, an anomaly-based intrusion detection protocol is developed to detect compromised nodes in wireless sensor networks.
The proposed protocol is implemented after the sensors are deployed into the environment in which they …