@article{ART001832382},
author={Kyun Rak Chong},
title={Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2013},
volume={18},
number={12},
pages={27-34}
TY - JOUR
AU - Kyun Rak Chong
TI - Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks
JO - Journal of The Korea Society of Computer and Information
PY - 2013
VL - 18
IS - 12
PB - The Korean Society Of Computer And Information
SP - 27
EP - 34
SN - 1598-849X
AB - In wireless sensor networks, sensors need to communicate with each other to send their sensing data to the administration node and so they are susceptible to many attacks like garbage packet injection that cannot be prevented by using traditional cryptographic approaches. A behavior-based detection is used to defend against such attacks in which some specialized monitoring nodes overhear the communications of their neighbors to detect bad packets. As monitoring nodes use more energy, it is desirable to use the minimal number of monitoring nodes to cover the whole or maximal part of the network. The monitoring nodes can either be selected among the deployed normal nodes or differ in type from normal nodes. In this study, we have developed an algorithm for selecting the predefined number of monitoring nodes needed to cover the maximum number of normal nodes when the different types of normal nodes and monitoring nodes are deployed. We also have investigated experimentally how the number of monitoring nodes and their transmission range affect the connection ratio of the monitoring nodes and the coverage of the normal nodes.
KW - behavior-based attack detection;wireless sensor network;sensor deployment
DO -
UR -
ER -
Kyun Rak Chong. (2013). Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks. Journal of The Korea Society of Computer and Information, 18(12), 27-34.
Kyun Rak Chong. 2013, "Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks", Journal of The Korea Society of Computer and Information, vol.18, no.12 pp.27-34.
Kyun Rak Chong "Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks" Journal of The Korea Society of Computer and Information 18.12 pp.27-34 (2013) : 27.
Kyun Rak Chong. Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks. 2013; 18(12), 27-34.
Kyun Rak Chong. "Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks" Journal of The Korea Society of Computer and Information 18, no.12 (2013) : 27-34.
Kyun Rak Chong. Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks. Journal of The Korea Society of Computer and Information, 18(12), 27-34.
Kyun Rak Chong. Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks. Journal of The Korea Society of Computer and Information. 2013; 18(12) 27-34.
Kyun Rak Chong. Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks. 2013; 18(12), 27-34.
Kyun Rak Chong. "Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks" Journal of The Korea Society of Computer and Information 18, no.12 (2013) : 27-34.