Filters








102 Hits in 4.9 sec

Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks [chapter]

Seth Gilbert, Rachid Guerraoui, Calvin Newport
2006 Lecture Notes in Computer Science  
How efficiently can a malicious device disrupt communication in a wireless network?  ...  These results imply bounds on adversarial efficiency, which we analyze in terms of jamming gain and disruption-free complexity.  ...  Attiya and G. Chockler for their comments and discussions.  ... 
doi:10.1007/11945529_16 fatcat:g272ivh4cnb3jot7zbkafr5oaq

Of malicious motes and suspicious sensors

Seth Gilbert, Rachid Guerraoui, Calvin Newport
2009 Theoretical Computer Science  
How efficiently can a malicious device disrupt a single-hop wireless network?  ...  From these results we can derive bounds on the efficiency of malicious disruption, stated in terms of two new metrics: jamming gain (the ratio of rounds delayed to adversarial broadcasts) and disruption-free  ...  Attiya for her helpful comments, and to G. Chockler for many long discussions and key insights.  ... 
doi:10.1016/j.tcs.2008.10.008 fatcat:4rctswrgjbe3xfks427iqkhxty

Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference [article]

Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders
2013 arXiv   pre-print
The guardians are deployed alongside a sensor network, inspecting all local traffic, classifying packets based on their content, and destroying any malicious packet while still on the air.  ...  range and affect large parts of a sensor network simultaneously.  ...  In the context of firewalls and WSNs, there are also efforts to bring an on-mote "personal firewall" to sensor networks [9] .  ... 
arXiv:1305.4038v1 fatcat:7mwdz4j7y5a7zhjdwitkwdiz5m

Wireless Sensor Network Security Analysis

Hemanta Kumar Kalita
2021 Zenodo  
While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. We propose some of the security goal for Wireless Sensor Network.  ...  Further, security being vital to the acceptance and use of sensor networks for many applications; we have made an in depth threat analysis of Wireless Sensor Network.  ...  The Application domains of Wireless Sensor Network are diverse due to the availability of micro-sensors and low-power wireless communications.  ... 
doi:10.5281/zenodo.5059911 fatcat:yrcshiws4vcj3deh7qcel3ai7i

Authentication in Wireless Sensor Networks

Dr. K. Nachimuthu
2018 International Journal for Research in Applied Science and Engineering Technology  
Wireless Sensor Networking (WSNs) is a region of incredible enthusiasm to both scholarly community and industry.  ...  Wireless Sensor Networking (WSNs) is a developing field of research that presents analysts with testing objectives under tight outline imperatives.  ...  One strategy in defending against the classic jamming attack is to identify the jammed part of the sensor network and effectively route around the unavailable portion.  ... 
doi:10.22214/ijraset.2018.7125 fatcat:7qla4a6if5fnniberhcipqiiey

Surveillance of mobile objects using coordinated wireless sensor nodes

Tony Larsson
2007 2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007)  
The wireless sensor nodes are monitored via radio base access points connected to a distributed application framework for analysis and coordination of security events.  ...  Surveillance of mobile office assets is made by attaching wireless sensor nodes to assets and to their authorized users.  ...  Acknowledgements This project was executed within CERES (Centre for Research on Embedded Systems) at Halmstad University supported by the Knowledge Foundation in Sweden, and Xerox Research Centre Europe  ... 
doi:10.1109/efta.2007.4416877 dblp:conf/etfa/Larsson07 fatcat:5zsni5thjbbftbpj4owrlscbo4

A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication

Abdullah Al Hayajneh, Md Zakirul Alam Bhuiyan, Ian McAndrew
2020 Computers  
This paper builds upon the foundation and clarifies specifications for a necessary security protocol in Wireless Sensor Networks (WSNs) with cooperative communications.  ...  In this paper, we consider security issues in WSNs with cooperative communication on each layer of the OSI model: physical layer, data link layer, network layer, service (topology) layer, and application  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/computers9010004 fatcat:hj2h7qyhxnffzn62c7b4xkar6i

A Comparison of Link Layer Attacks on Wireless Sensor Networks

Shahriar Mohammadi, Hossein Jadidoleslamy
2011 International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks  
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges.  ...  In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide  ...  is:  Main challenge in WSNs;  Sourced from inside of the WSN and access to all other nodes within its range [2, 3, 9] ;  Authorized node in the WSN is malicious/compromised;  Executing malicious  ... 
doi:10.5121/jgraphhoc.2011.3103 fatcat:574lhfevejfw3b6rwu4zrn6bb4

Autonomic Communication Security in Sensor Networks [chapter]

Tassos Dimitriou, Ioannis Krontiris
2006 Lecture Notes in Computer Science  
The nature of security threats in such networks as well as the nature of the network itself raise additional security challenges, so new mechanisms and architectures must be designed to protect them.  ...  The fact that sensor networks are deployed in wide dynamically changing environment and usually left unattended, calls for nomadic, diverse and autonomic behavior.  ...  Adversaries can involve malicious transmissions into the network to interfere with sensor network protocols and induce battery exhaustion or physically destroy central network nodes.  ... 
doi:10.1007/11687818_11 fatcat:gqxm6ieo2bfqvkntva2iqrzsti

Energy conserving security mechanisms for wireless sensor networks

Md. Abdul Hamid, Choong Seon Hong
2009 Annales des télécommunications  
Since wireless sensor networks are emerging as innovative technologies for realizing a variety of functions through a number of compact sensor nodes, security must be justified and ensured prior to their  ...  An adversary may compromise sensor nodes, forcing them to generate undesired data, and propagation of these data packets through the network results in wasteful energy consumption.  ...  Acknowledgements This research was supported by the MKE under the ITRC support program supervised by the IITA(IITA-2008- (C1090-0801-0016) ). Dr. Choong Seon Hong is the corresponding author.  ... 
doi:10.1007/s12243-009-0088-z fatcat:ms7ddmq2mrf7xhtysktzpisir4

Fine-grained analysis of packet losses in wireless sensor networks

Bilal Shebaro, Daniele Midi, Elisa Bertino
2014 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)  
Packet losses in a wireless sensor network represent an indicator of possible attacks to the network.  ...  In a wireless sensor network, packet losses can result from attacks affecting the nodes or the wireless links connecting the nodes.  ...  Experiment 2: Interference Effect on Link Profiles: In order to test the impact of interference on link profiles, we activated our interference mote and placed it close to Node 3.  ... 
doi:10.1109/sahcn.2014.6990368 dblp:conf/secon/ShebaroMB14 fatcat:q7gnhwl7mfgx7kc3jdzwk3culu

Optimized Energy Efficient Trust Aware System in Wireless Sensor Networks

Palak Aggarwal, Santosh Kumar, Neha Garg, Sumeshwar Singh
2017 Journal of Wireless Communications  
Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be handled.  ...  Insider packet drop attack is one of the dangerous attacks for wireless sensor network that causes a heavy damage to WSN functionalities by dropping packets.  ...  ACKNOWLEDGMENT The authors of this paper wish to acknowledge department of Computer Science and Engineering, Graphic Era University, Dehradun, India for all the facilities provided for this research work  ... 
doi:10.21174/jowc.v2i1.74 fatcat:z74nby35ovhptjwq4nebecf3j4

Monitoring of Wireless Sensor Networks [chapter]

Khelifa Benahmed, Haffaf Hafid, Madjid Merabti
2010 Sustainable Wireless Sensor Networks  
to a suspicious node of red colour , and lastly, a malicious node with black colour.  ...  coverage), and the security in wireless sensor networks.  ...  Sustainable Wireless Sensor Networks Wireless Sensor Networks came into prominence around the start of this millennium motivated by the omnipresent scenario of small-sized sensors with limited power deployed  ... 
doi:10.5772/13239 fatcat:pvjb7rbndzf45m7dagi5b5koni

A Comparison of Link Layer Attacks on Wireless Sensor Networks

Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy
2011 Journal of Information Security  
Wireless sensor networks (WSNs) have many potential applications [1,2] and unique challenges.  ...  In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide  ...  is:  Main challenge in WSNs;  Sourced from inside of the WSN and access to all other nodes within its range [2, 3, 9] ;  Authorized node in the WSN is malicious/compromised;  Executing malicious  ... 
doi:10.4236/jis.2011.22007 fatcat:wo7ok6hzofatnnrkwoevac7xcy

An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks [article]

A. Forootaninia, M. B. Ghaznavi-Ghoushchi
2012 arXiv   pre-print
Preserving security and confidentiality in wireless sensor networks (WSN) are crucial.  ...  Wireless sensor networks in comparison with wired networks are more substantially vulnerable to attacks and intrusions. In WSN, a third person can eavesdrop to the information or link to the network.  ...  Most of them have been conducted on intrusion detection techniques.  ... 
arXiv:1208.2079v1 fatcat:ttu4oulpnfg35ikzvzwfut5kfi
« Previous Showing results 1 — 15 out of 102 results