Skip to main content

Analysis of Methods for Detecting Compromised Nodes and its Countermeasures

  • Conference paper
  • First Online:
  • 706 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 215))

Abstract

The increased application of sensor network introduces new security challenges. In this paper, we analyze the detection methods of compromised nodes and its countermeasure in the sensor network. We first review common attacks in the sensor network application which can compromise a valid, resource-constrained node (or called device). Then, we introduce several standard detection approaches to show their characteristics in different applications of the sensor network. Finally, we summarize and discuss existing countermeasures to the compromised nodes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    A protocol preserves the secrecy of some term M if an adversary cannot obtain M by constructing it from the outputs of the protocol.

  2. 2.

    If the initiator thinks the protocol has been executed with another group member, then it really has, and similarly for a responder.

References

  1. Zhao F, Hanatani Y, Komano Y, Smyth B, Ito S, Kambayashi T (2012) Secure authenticated key exchange with revocation for smart grid. In: Proceedings of the third IEEE power and energy society conference on innovative smart grid technologies (ISGT), 2012

    Google Scholar 

  2. Seshadri A, Perrig A, Doorn L, Khosla P (2004) SWATT: SoftWare-based attestation for embedded devices. In: Proceedings of the IEEE symposium on security and privacy, 2004

    Google Scholar 

  3. Trusted Computing Group. http://www.trustedcomputinggroup.org

  4. Shi E, Perrig A, Doorn L (2005) BIND: a fine-grained attestation service for secure distributed systems. In: Proceedings of the 2005 IEEE symposium on security and privacy, 2005

    Google Scholar 

  5. Chor B, Fiat A, Naor M, Pinkas B (2000) Tracing traitors. IEEE Trans Inf Theory 46(3):893–910

    Google Scholar 

  6. AACS Specifications (2010) Introduction and Common Cryptographic Elements Book Rev 0.951

    Google Scholar 

  7. Fiat A, Naor M (1993) Broadcast encryption. In: Proceedings of Crypto 1993. LNCS, vol 773. Springer-Verlag, Berlin, pp 480–49191

    Google Scholar 

  8. Naor D, Naor M, Lotspiech J (2001) Revocation and tracing schemes for stateless receivers. In: Proceedings of Crypto. LNCS, vol 2139, Springer, Heidelberg, pp 41–62

    Google Scholar 

  9. NIST SP 800-32 (2001) Introduction to Public Key. Technology and the Federal PKI

    Google Scholar 

Download references

Acknowledgments

This research is partially supported by JAPAN SCIENCE AND TECHNOLOGY AGENCY (JST), Strategic Japanese-Indian Cooperative Programme on Multidisciplinary Research Field, which combines Information and Communications Technology with Other Fields, entitled “Analysis of Cryptographic Algorithms and Evaluation on Enhancing Network Security Based on Mathematical Science”. This research is also partially supported by Grants-in-Aid for Scientific Research (B) (23300027), Japan Society for the Promotion of Science (JSPS).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fangming Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Zhao, F., Nishide, T., Hori, Y., Sakurai, K. (2013). Analysis of Methods for Detecting Compromised Nodes and its Countermeasures. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5860-5_7

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5859-9

  • Online ISBN: 978-94-007-5860-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics