Download PDFOpen PDF in browserMemory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks12 pages•Published: July 18, 2022AbstractThis paper shows how it is at least in principle possible to detect impostor nodes in wireless sensor networks with a quite simplistic detection algorithm by purely statistical means and merely from external observation without any knowledge of the impostor’s inter- nal composition. This method, however, requires considerable volumes of internal memory for any WSN node on which such detection algorithms are supposed to be implemented.Keywords: Wireless Sensor Networks · WSN Reliability · WSN Integrity · WSN Safety and Security · WSN Trustworthiness · Node Replication Attacks · Intrusion Detection · Probabilistic Finite Automata · Randomised Detection Algorithm · Detection Accuracy · Memory Requirements Keyphrases: detection accuracy, intrusion detection, memory requirements, node replication attacks, probabilistic finite automata, randomised detection algorithm, wireless sensor networks, wsn integrity, wsn reliability, wsn safety and security, wsn trustworthiness In: Aurona Gerber (editor). Proceedings of 43rd Conference of the South African Institute of Computer Scientists and Information Technologists, vol 85, pages 36-47.
|