KŮR, Jiří and Václav MATYÁŠ. A protocol for intrusion detection in location privacy-aware wireless sensor networks. In Eckert, Claudia, Katsikas, Sokratis K., Pernul, Günther. Trust, Privacy, and Security in Digital Business, 11th International Conference, TrustBus 2014. Heidelberg: Springer, 2014, p. 180-190. ISBN 978-3-319-09769-5. Available from: https://dx.doi.org/10.1007/978-3-319-09770-1_16.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name A protocol for intrusion detection in location privacy-aware wireless sensor networks
Authors KŮR, Jiří (203 Czech Republic, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, guarantor, belonging to the institution).
Edition Heidelberg, Trust, Privacy, and Security in Digital Business, 11th International Conference, TrustBus 2014, p. 180-190, 11 pp. 2014.
Publisher Springer
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Germany
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
Impact factor Impact factor: 0.402 in 2005
RIV identification code RIV/00216224:14330/14:00073816
Organization unit Faculty of Informatics
ISBN 978-3-319-09769-5
ISSN 0302-9743
Doi http://dx.doi.org/10.1007/978-3-319-09770-1_16
Keywords in English security protocol; intrusion detection; privacy; wireless sensor networks
Tags firank_B
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 27/4/2015 05:53.
Abstract
Wireless sensor networks come with some very challenging demands for security -- they often call for protection against active attackers trying to disrupt a network operation, but also against passive attackers looking for (potentially) sensitive information about the location of a certain node or about the movement of a tracked object. Selective forwarding is a basic yet powerful active attack. It can be detected using several existing techniques if enough information is available to an intrusion detection system. Yet when the system lacks the information due to a location privacy measure, selective forwarding detection becomes complicated. In this paper, we propose a method for detecting selective forwarding attacks and packet modification attacks concurrently with supporting location privacy. The resulting system counters a global eavesdropper capable of some active actions, such as dropping and modification of packets. We also evaluate detection accuracy of the proposed method on a small scale real-world sensor network.
Links
GAP202/11/0422, research and development projectName: Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích (Acronym: P202/11/0422)
Investor: Czech Science Foundation
PrintDisplayed: 14/5/2024 01:38