Detailed Information on Publication Record
2014
A protocol for intrusion detection in location privacy-aware wireless sensor networks
KŮR, Jiří and Václav MATYÁŠBasic information
Original name
A protocol for intrusion detection in location privacy-aware wireless sensor networks
Authors
KŮR, Jiří (203 Czech Republic, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, guarantor, belonging to the institution)
Edition
Heidelberg, Trust, Privacy, and Security in Digital Business, 11th International Conference, TrustBus 2014, p. 180-190, 11 pp. 2014
Publisher
Springer
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
Germany
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
printed version "print"
Impact factor
Impact factor: 0.402 in 2005
RIV identification code
RIV/00216224:14330/14:00073816
Organization unit
Faculty of Informatics
ISBN
978-3-319-09769-5
ISSN
Keywords in English
security protocol; intrusion detection; privacy; wireless sensor networks
Tags
International impact, Reviewed
Změněno: 27/4/2015 05:53, RNDr. Pavel Šmerk, Ph.D.
Abstract
V originále
Wireless sensor networks come with some very challenging demands for security -- they often call for protection against active attackers trying to disrupt a network operation, but also against passive attackers looking for (potentially) sensitive information about the location of a certain node or about the movement of a tracked object. Selective forwarding is a basic yet powerful active attack. It can be detected using several existing techniques if enough information is available to an intrusion detection system. Yet when the system lacks the information due to a location privacy measure, selective forwarding detection becomes complicated. In this paper, we propose a method for detecting selective forwarding attacks and packet modification attacks concurrently with supporting location privacy. The resulting system counters a global eavesdropper capable of some active actions, such as dropping and modification of packets. We also evaluate detection accuracy of the proposed method on a small scale real-world sensor network.
Links
GAP202/11/0422, research and development project |
|