Affiliation:
1. Imperial College London, London SW, UK
Abstract
Wireless Sensor Networks are widely advocated to monitor environmental parameters, structural integrity of the built environment and use of urban spaces, services and utilities. However, embedded sensors are vulnerable to compromise by external actors through malware but also through their wireless and physical interfaces. Compromised sensors can be made to report false measurements with the aim to produce inappropriate and potentially dangerous responses. Such malicious data injections can be particularly difficult to detect if multiple sensors have been compromised as they could emulate plausible sensor behaviour such as failures or detection of events where none occur. This survey reviews the related work on malicious data injection in wireless sensor networks, derives general principles and a classification of approaches within this domain, compares related studies and identifies areas that require further investigation.
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference79 articles.
1. Idris M. Atakli Hongbing Hu Yu Chen Wei-Shinn Ku and Zhou Su. 2008. Malicious node detection in wireless sensor networks using weighted trust evaluation. In SpringSim Hassan Rajaei Gabriel A. Wainer and Michael J. Chinni (Eds.). SCS/ACM 836--843. Idris M. Atakli Hongbing Hu Yu Chen Wei-Shinn Ku and Zhou Su. 2008. Malicious node detection in wireless sensor networks using weighted trust evaluation. In SpringSim Hassan Rajaei Gabriel A. Wainer and Michael J. Chinni (Eds.). SCS/ACM 836--843.
2. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
3. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks;Bertino Elisa;DOI:http://dx.doi.org/10.1109/TDSC.,2014
Cited by
58 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献