Gruner, StefanKrajnc, DylanVan Rooyen, Johan Pieter2023-06-122023-06-122022Gruner, S, Krajnc, D., VanRooyen, J.P. 2022, 'Memory requirements for the detection of impostor nodes in wireless sensor networks', EPiC Series in Computing, vol. 85, pp. 36-47, doi : 10.29007/8ds7.2398-734010.29007/8ds7http://hdl.handle.net/2263/91095This paper shows how it is at least in principle possible to detect impostor nodes in wireless sensor networks with a quite simplistic detection algorithm by purely statistical means and merely from external observation without any knowledge of the impostor’s internal composition. This method, however, requires considerable volumes of internal memory for any WSN node on which such detection algorithms are supposed to be implemented.enAll EPiC volumes are open access.Wireless sensor networksWSN reliabilityWSN integrityWSN safety and securityWSN trustworthinessNode replication attacksIntrusion detectionProbabilistic finite automataRandomised detection algorithmDetection accuracyMemory requirementsWireless sensor network (WSN)Memory requirements for the detection of impostor nodes in wireless sensor networksArticle