How to Establish a Hacker Response Scenario as a CTO: Tips, Techniques & Best Practices for Putting Measures in Place that will Enable You to React Immediately
- Published: July 2011
This product is currently not available for purchase.
Security issues in Wireless sensor networks (WSNs) mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area.
Xiangqian Chen received the PhD degree in Electrical and Computer Engineering from Florida International University in December 2007. His current research interests include wireless