Security evaluation methodology for intrusion recovery protocols in wireless sensor networks

Eliana Stavrou, Andreas Pitsillides

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Citations (Scopus)

Abstract

Researchers have designed intrusion recovery protocols in Wireless Sensor Networks (WSN) with the aim of restoring compromised services and promoting a secure and reliable environment in WSNs. Currently, evaluation frameworks in WSNs have been proposed in a generic security context and do not constitute a representative assessment of intrusion recovery protocols. This paper proposes an evaluation methodology to aid the evaluation and comparison of intrusion recovery protocols in WSNs. The methodology defines the intrusion recovery protocol aspects that should be evaluated using a number of evaluation criteria and guides researchers in identifying the evaluation direction they should follow.

Original languageEnglish
Title of host publicationMSWiM'12 - Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
Pages167-170
Number of pages4
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2012 - Paphos, Cyprus
Duration: 21 Oct 201225 Oct 2012

Publication series

NameMSWiM'12 - Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems

Conference

Conference15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2012
Country/TerritoryCyprus
CityPaphos
Period21/10/1225/10/12

Keywords

  • Intrusion recovery
  • Performance evaluation
  • Security
  • WSN

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Modeling and Simulation

Fingerprint

Dive into the research topics of 'Security evaluation methodology for intrusion recovery protocols in wireless sensor networks'. Together they form a unique fingerprint.

Cite this