A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks
[chapter]
2006
Lecture Notes in Computer Science
How efficiently can a malicious device disrupt communication in a wireless network? ...
These results imply bounds on adversarial efficiency, which we analyze in terms of jamming gain and disruption-free complexity. ...
Attiya and G. Chockler for their comments and discussions. ...
doi:10.1007/11945529_16
fatcat:g272ivh4cnb3jot7zbkafr5oaq
Of malicious motes and suspicious sensors
2009
Theoretical Computer Science
How efficiently can a malicious device disrupt a single-hop wireless network? ...
From these results we can derive bounds on the efficiency of malicious disruption, stated in terms of two new metrics: jamming gain (the ratio of rounds delayed to adversarial broadcasts) and disruption-free ...
Attiya for her helpful comments, and to G. Chockler for many long discussions and key insights. ...
doi:10.1016/j.tcs.2008.10.008
fatcat:4rctswrgjbe3xfks427iqkhxty
Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference
[article]
2013
arXiv
pre-print
The guardians are deployed alongside a sensor network, inspecting all local traffic, classifying packets based on their content, and destroying any malicious packet while still on the air. ...
range and affect large parts of a sensor network simultaneously. ...
In the context of firewalls and WSNs, there are also efforts to bring an on-mote "personal firewall" to sensor networks [9] . ...
arXiv:1305.4038v1
fatcat:7mwdz4j7y5a7zhjdwitkwdiz5m
Wireless Sensor Network Security Analysis
2021
Zenodo
While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. We propose some of the security goal for Wireless Sensor Network. ...
Further, security being vital to the acceptance and use of sensor networks for many applications; we have made an in depth threat analysis of Wireless Sensor Network. ...
The Application domains of Wireless Sensor Network are diverse due to the availability of micro-sensors and low-power wireless communications. ...
doi:10.5281/zenodo.5059911
fatcat:yrcshiws4vcj3deh7qcel3ai7i
Authentication in Wireless Sensor Networks
2018
International Journal for Research in Applied Science and Engineering Technology
Wireless Sensor Networking (WSNs) is a region of incredible enthusiasm to both scholarly community and industry. ...
Wireless Sensor Networking (WSNs) is a developing field of research that presents analysts with testing objectives under tight outline imperatives. ...
One strategy in defending against the classic jamming attack is to identify the jammed part of the sensor network and effectively route around the unavailable portion. ...
doi:10.22214/ijraset.2018.7125
fatcat:7qla4a6if5fnniberhcipqiiey
Surveillance of mobile objects using coordinated wireless sensor nodes
2007
2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007)
The wireless sensor nodes are monitored via radio base access points connected to a distributed application framework for analysis and coordination of security events. ...
Surveillance of mobile office assets is made by attaching wireless sensor nodes to assets and to their authorized users. ...
Acknowledgements This project was executed within CERES (Centre for Research on Embedded Systems) at Halmstad University supported by the Knowledge Foundation in Sweden, and Xerox Research Centre Europe ...
doi:10.1109/efta.2007.4416877
dblp:conf/etfa/Larsson07
fatcat:5zsni5thjbbftbpj4owrlscbo4
A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication
2020
Computers
This paper builds upon the foundation and clarifies specifications for a necessary security protocol in Wireless Sensor Networks (WSNs) with cooperative communications. ...
In this paper, we consider security issues in WSNs with cooperative communication on each layer of the OSI model: physical layer, data link layer, network layer, service (topology) layer, and application ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/computers9010004
fatcat:hj2h7qyhxnffzn62c7b4xkar6i
A Comparison of Link Layer Attacks on Wireless Sensor Networks
2011
International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. ...
In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide ...
is: Main challenge in WSNs; Sourced from inside of the WSN and access to all other nodes within its range [2, 3, 9] ; Authorized node in the WSN is malicious/compromised; Executing malicious ...
doi:10.5121/jgraphhoc.2011.3103
fatcat:574lhfevejfw3b6rwu4zrn6bb4
Autonomic Communication Security in Sensor Networks
[chapter]
2006
Lecture Notes in Computer Science
The nature of security threats in such networks as well as the nature of the network itself raise additional security challenges, so new mechanisms and architectures must be designed to protect them. ...
The fact that sensor networks are deployed in wide dynamically changing environment and usually left unattended, calls for nomadic, diverse and autonomic behavior. ...
Adversaries can involve malicious transmissions into the network to interfere with sensor network protocols and induce battery exhaustion or physically destroy central network nodes. ...
doi:10.1007/11687818_11
fatcat:gqxm6ieo2bfqvkntva2iqrzsti
Energy conserving security mechanisms for wireless sensor networks
2009
Annales des télécommunications
Since wireless sensor networks are emerging as innovative technologies for realizing a variety of functions through a number of compact sensor nodes, security must be justified and ensured prior to their ...
An adversary may compromise sensor nodes, forcing them to generate undesired data, and propagation of these data packets through the network results in wasteful energy consumption. ...
Acknowledgements This research was supported by the MKE under the ITRC support program supervised by the IITA(IITA-2008- (C1090-0801-0016) ). Dr. Choong Seon Hong is the corresponding author. ...
doi:10.1007/s12243-009-0088-z
fatcat:ms7ddmq2mrf7xhtysktzpisir4
Fine-grained analysis of packet losses in wireless sensor networks
2014
2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)
Packet losses in a wireless sensor network represent an indicator of possible attacks to the network. ...
In a wireless sensor network, packet losses can result from attacks affecting the nodes or the wireless links connecting the nodes. ...
Experiment 2: Interference Effect on Link Profiles: In order to test the impact of interference on link profiles, we activated our interference mote and placed it close to Node 3. ...
doi:10.1109/sahcn.2014.6990368
dblp:conf/secon/ShebaroMB14
fatcat:q7gnhwl7mfgx7kc3jdzwk3culu
Optimized Energy Efficient Trust Aware System in Wireless Sensor Networks
2017
Journal of Wireless Communications
Energy and security are very important issues in Wireless Sensor Networks (WSN) which need to be handled. ...
Insider packet drop attack is one of the dangerous attacks for wireless sensor network that causes a heavy damage to WSN functionalities by dropping packets. ...
ACKNOWLEDGMENT The authors of this paper wish to acknowledge department of Computer Science and Engineering, Graphic Era University, Dehradun, India for all the facilities provided for this research work ...
doi:10.21174/jowc.v2i1.74
fatcat:z74nby35ovhptjwq4nebecf3j4
Monitoring of Wireless Sensor Networks
[chapter]
2010
Sustainable Wireless Sensor Networks
to a suspicious node of red colour , and lastly, a malicious node with black colour. ...
coverage), and the security in wireless sensor networks. ...
Sustainable Wireless Sensor Networks Wireless Sensor Networks came into prominence around the start of this millennium motivated by the omnipresent scenario of small-sized sensors with limited power deployed ...
doi:10.5772/13239
fatcat:pvjb7rbndzf45m7dagi5b5koni
A Comparison of Link Layer Attacks on Wireless Sensor Networks
2011
Journal of Information Security
Wireless sensor networks (WSNs) have many potential applications [1,2] and unique challenges. ...
In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide ...
is: Main challenge in WSNs; Sourced from inside of the WSN and access to all other nodes within its range [2, 3, 9] ; Authorized node in the WSN is malicious/compromised; Executing malicious ...
doi:10.4236/jis.2011.22007
fatcat:wo7ok6hzofatnnrkwoevac7xcy
An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks
[article]
2012
arXiv
pre-print
Preserving security and confidentiality in wireless sensor networks (WSN) are crucial. ...
Wireless sensor networks in comparison with wired networks are more substantially vulnerable to attacks and intrusions. In WSN, a third person can eavesdrop to the information or link to the network. ...
Most of them have been conducted on intrusion detection techniques. ...
arXiv:1208.2079v1
fatcat:ttu4oulpnfg35ikzvzwfut5kfi
« Previous
Showing results 1 — 15 out of 102 results