2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)
Download PDF

Abstract

In wireless sensor networks, Intrusion Detection through sensor monitoring allows locating intricate security attacks like denial of service and routing attacks. Nevertheless, the monitoring process observing sensors behavior can induce an important energy and bandwidth overhead. Furthermore, the monitors can be attacked and their observations would be corrupted. In this paper, we propose an adaptable monitoring system that optimizes sensor resources and resists monitor security attacks. The idea is to select periodically monitors with high reputation and high resilient energy. A theoretical evaluation and simulation results demonstrates the promising efficiency of the proposed approach
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles