{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T15:13:22Z","timestamp":1772032402941,"version":"3.50.1"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0430274CAREER-0447761CNS-0430223"],"award-info":[{"award-number":["IIS-0430274CAREER-0447761CNS-0430223"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["IIS-0430274CAREER-0447761CNS-0430223"],"award-info":[{"award-number":["IIS-0430274CAREER-0447761CNS-0430223"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-0430274CAREER-0447761CNS-0430223"],"award-info":[{"award-number":["IIS-0430274CAREER-0447761CNS-0430223"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2008,3,15]]},"abstract":"<jats:p>Sensor networks are often subject to physical attacks. Once a node's cryptographic key is compromised, an attacker may completely impersonate it and introduce arbitrary false information into the network. Basic cryptographic mechanisms are often not effective in this situation. Most techniques to address this problem focus on detecting and tolerating false information introduced by compromised nodes. They cannot pinpoint exactly where the false information is introduced and who is responsible for it.<\/jats:p>\n          <jats:p>In this article, we propose an application-independent framework for accurately identifying compromised sensor nodes. The framework provides an appropriate abstraction of application-specific detection mechanisms and models the unique properties of sensor networks. Based on the framework, we develop alert reasoning algorithms to identify compromised nodes. The algorithm assumes that compromised nodes may collude at will. We show that our algorithm is optimal in the sense that it identifies the largest number of compromised nodes without introducing false positives. We evaluate the effectiveness of the designed algorithm through comprehensive experiments.<\/jats:p>","DOI":"10.1145\/1341731.1341733","type":"journal-article","created":{"date-parts":[[2008,3,25]],"date-time":"2008-03-25T14:01:40Z","timestamp":1206453700000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["A Framework for Identifying Compromised Nodes in Wireless Sensor Networks"],"prefix":"10.1145","volume":"11","author":[{"given":"Qing","family":"Zhang","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"Ting","family":"Yu","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Peng","family":"Ning","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]}],"member":"320","published-online":{"date-parts":[[2008,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502638"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1214345"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012319418150"},{"key":"e_1_2_1_4_1","volume-title":"9th European Symposium On Research in Computer Security (ESORICS'04)","author":"Camtepe S."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy(SP'03)","author":"Chan H."},{"key":"e_1_2_1_6_1","unstructured":"Crossbow Technology Inc. 2003. MTS\/MDA Sensor and Data Acquisition Boards User Manual. Crossbow Technology Inc. 2003. MTS\/MDA Sensor and Data Acquisition Boards User Manual ."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1983.1676140"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1983.1676322"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1984.1676472"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1987.1676912"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986870"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS).","author":"Deng J."},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the IEEE Global Communications Conference (GLOBECOM).","author":"Du W."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948118"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.267"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029115"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the International Conference on Knowledge Engineering and Knowledge Management (EKAW)","author":"Golbeck J."},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the IEEE International Symposium on Information Theory (ISIT).","author":"Ho T."},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the Workshop on Security and Assurance in Ad Hoc Networks.","author":"Hu L."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.102834"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_25_1","unstructured":"Lawrence R. Sergey B. Rajeev M. and Terry W. 1998. The PageRank citation ranking: Bringing order to the Web. Tech. rep. Department of Computer Science Stanford University. Lawrence R. Sergey B. Rajeev M. and Terry W. 1998. The PageRank citation ranking: Bringing order to the Web. Tech. rep. Department of Computer Science Stanford University."},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM).","author":"Lee S."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS'03)","author":"Liu D."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.21"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009378.1009551"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 21st Symp. Foundations of Computing.","author":"Micali S."},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the 35th Hawaii International Conference on System Science.","author":"Mui L."},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Perrig A."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/PGEC.1967.264748"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the 2nd International Semantic Web Conference.","author":"Richardson M."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.2182"},{"key":"e_1_2_1_40_1","volume-title":"2001. Approximation Algorithms","author":"Vazirani V. V."},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the 5th International Conference on Electronic Commerce Research (ICECR).","author":"Xiong L."},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM).","author":"Ye F."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544809"},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the 2nd IEEE Communications Society\/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm'06)","author":"Zhang Q."},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy, 260--272","author":"Zhu S."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1341731.1341733","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1341731.1341733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:54Z","timestamp":1750253934000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1341731.1341733"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,3,15]]}},"alternative-id":["10.1145\/1341731.1341733"],"URL":"https:\/\/doi.org\/10.1145\/1341731.1341733","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,3]]},"assertion":[{"value":"2007-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2007-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}