Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Compromised Node

Handbook of Research on Wireless Security
A node on which an attacker has gained control after network deployment. Generally compromise occurs once an attacker has found a node, and then directly connects the node to their computer via a wired connection of some sort. Once connected the attacker controls the node by extracting the data and/or putting new data or controls on that node.
Published in Chapter:
Security in Wireless Sensor Networks
Luis E. Palafox (CICESE Research Center, Mexico) and J. Antonio Garcia-Macias (CICESE Research Center, Mexico)
Copyright: © 2008 |Pages: 18
DOI: 10.4018/978-1-59904-899-4.ch034
Abstract
In this chapter we present the growing challenges related to security in wireless sensor networks. We show possible attack scenarios and evidence the easiness of perpetrating several types of attacks due to the extreme resource limitations that wireless sensor networks are subjected to. Nevertheless, we show that security is a feasible goal in this resource-limited environment; to prove that security is possible we survey several proposed sensor network security protocols targeted to different layers in the protocol stack. The work surveyed in this chapter enable several protection mechanisms vs. well documented network attacks. Finally, we summarize the work that has been done in the area and present a series of ongoing challenges for future work.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR