Filters








319 Hits in 10.5 sec

Predictability Trust for Wireless Sensor Networks to Provide a Defense Against On/off attack

Younghun Chae, Lisa DiPippo, Yan Sun
2012 Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
In Wireless Sensor Networks (WSNs), sensors collaborate to perform various tasks, such as routing.  ...  In this paper, we present a new trust redemption scheme that cannot only discriminate between temporary errors and an On/off attack, but can also provide a flexible design.  ...  So TBDR provides a defense against an On/off attack by slowing down the redemption speed of an On/off attack node and minimizing its usage in the network.  ... 
doi:10.4108/icst.collaboratecom.2012.250447 dblp:conf/colcom/ChaeDS12 fatcat:alnk2ckmozew3jodcvi3dfoota

Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey

Weidong Fang, Wuxiong Zhang, Wei Chen, Tao Pan, Yepeng Ni, Yinxuan Yang
2020 Wireless Communications and Mobile Computing  
Due to constrained resources of sensor node, WSN is becoming a vulnerable target to many security attacks. Compared to external attacks, it is more difficult to defend against internal attacks.  ...  As a key component of the information sensing and aggregating for big data, cloud computing, and Internet of Things (IoT), the information security in wireless sensor network (WSN) is critical.  ...  Combining the screening for recommendations, it could defend against the bad-mouthing attacks and on-off attacks to a certain extent.  ... 
doi:10.1155/2020/2643546 fatcat:l4zu6xoo7bc5bptvbjsqagowze

ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks

Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, Athanasios V. Vasilakos
2012 IEEE Transactions on Information Technology in Biomedicine  
In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture.  ...  Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks  ...  ) and 2) on-off attack with (2) (i.e., the defense against on-off attack is activated).  ... 
doi:10.1109/titb.2012.2194788 pmid:22531816 fatcat:x644ypmr7ne55gdcx3qykwni4q

Data integrity attacks and defenses for Intel lab sensor network

Renchi Yan, Teng Xu, Miodrag Potkonjak
2015 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT)  
Wireless sensor networks have facilitated our life using the remote sensing ability.  ...  Wireless sensor networks have been increasingly popular and they have been deployed in a wide range of areas including transportation system, healthcare, robotics, and smart home.  ...  For Intel lab sensor, this leads to turning on/off the air conditioner controlled by an attacker.  ... 
doi:10.1109/wf-iot.2015.7389143 dblp:conf/wf-iot/Yan0P15 fatcat:d3sez5bs4valvnhwcgvklkvp64

A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks

Yan Lindsay Sun, Zue Han, Wei Yu, K.J. Ray Liu
2006 Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications  
The attacks against trust evaluation are identified and defense techniques are developed.  ...  In this paper, we present a framework to quantitatively measure trust, model trust propagation, and defend trust evaluation systems against malicious attacks.  ...  On-off Attack For the on-off attack, we would like to compare four scenarios: (1) no on-off attack but attacking all the time; (2) with on-off attack and using forgetting factor 1 to defend; (3) with on-off  ... 
doi:10.1109/infocom.2006.154 dblp:conf/infocom/SunHYL06 fatcat:et7peezxzbeetllzsvbrsyt53y

On handling insider attacks in wireless sensor networks

Christoph Krauß, Markus Schneider, Claudia Eckert
2008 Information Security Technical Report  
Such attacks are denoted as insider attacks and pose a serious threat for wireless sensor networks.  ...  Abstract Wireless sensor networks are a relatively new technology for information gathering and processing. A sensor network usually consists of many, resource constrained sensor nodes.  ...  Introduction Wireless Sensor Networks (WSNs) provide a technological basis for many different applications.  ... 
doi:10.1016/j.istr.2008.10.011 fatcat:d4bh3jwjp5c7vg6fcn7q5b45ly

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices [article]

Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac
2017 arXiv   pre-print
Furthermore, we evaluated the performance of 6thSense against three sensor-based threats: (1) a malicious App that can be triggered via a sensor (e.g., light), (2) a malicious App that can leak information  ...  In this paper, we propose 6thSense, a context-aware intrusion detection system which enhances the security of smart devices by observing changes in sensor data for different tasks of users and creating  ...  Note that in 6thSense some sensors provide discrete values as data (e.g., accelerometer, gyroscope, light sensor, etc.) while other sensors provide their on-off state as sensor data (e.g., microphone,  ... 
arXiv:1706.10220v1 fatcat:cgqh2u25fvalharti3rokkufl4

Autonomic Response to Distributed Denial of Service Attacks [chapter]

Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid
2001 Lecture Notes in Computer Science  
Acknowledgements The authors would like to thank Jack Oden for distilling and Mary Ellen Leishear for editing the original report into this article.  ...  Acknowledgments The authors would like to acknowledge the valuable suggestions of the anonymous reviewers.  ...  Devices seeking to minimize energy expenditures for communications will use various forms of on/off communications.  ... 
doi:10.1007/3-540-45474-8_9 fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm

VANSec: Attack-Resistant VANET Security Algorithm in Terms of Trust Computation Error and Normalized Routing Overhead

Sheeraz Ahmed, Mujeeb Ur Rehman, Atif Ishtiaq, Sarmadullah Khan, Armughan Ali, Shabana Begum
2018 Journal of Sensors  
The presented scheme is more immune and resistive against different kinds of attacks and thwarts malicious node penetration attempts to the entire network.  ...  There is no optimum routing protocol which ensures full-pledge on-time delivery of data to destination nodes, and an absolutely optimum scheme design for flawless packet exchange is still a challenging  ...  /off attacks lead network application to threats of various attacks.  ... 
doi:10.1155/2018/6576841 fatcat:uo4mu2ucvrg75dr36gz6jjensu

Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks

Hamid Al-Hamadi, Ing-Ray Chen
2015 IEEE Transactions on Network and Service Management  
We propose and analyze adaptive network defense management for countering smart attack and selective capture which aim to cripple the basic data delivery functionality of a base station based wireless  ...  We develop a model-based analysis methodology with simulation validation to identify the best defense protocol settings under which the sensor network lifetime is maximized against selective capture and  ...  in a wireless sensor network to block data delivery.  ... 
doi:10.1109/tnsm.2015.2441059 fatcat:qz3emw2ok5f63bhdgr3boupygi

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay Jha
2015 IEEE Transactions on Dependable and Secure Computing  
Such algorithms simultaneously aggregate data from multiple sources and provide trust assessment of these sources, usually in a form of corresponding weight factors assigned to data provided by each source  ...  to a novel sophisticated collusion attack we introduce.  ...  Trust and reputation systems have a significant role in supporting operation of a wide range of distributed systems, from wireless sensor networks and e-commerce infrastructure to social networks, by providing  ... 
doi:10.1109/tdsc.2014.2316816 fatcat:6virrcqib5ftfiaimfmq4idxz4

Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures

Konstantinos Tsiknas, Dimitrios Taketzis, Konstantinos Demertzis, Charalabos Skianis
2021 IoT  
In this context, this study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions for these attacks, as they have been proposed in the most recent  ...  In this framework, given that the protection of industrial equipment is a requirement inextricably linked to technological developments and the use of the IoT, it is important to identify the major vulnerabilities  ...  , the margin of error to be ensured for system security, on/off commands, etc.  ... 
doi:10.3390/iot2010009 fatcat:qf2won2u5zes3gag264k3l7pjq

Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA [article]

Moshe Kravchik, Asaf Shabtai
2019 arXiv   pre-print
Finally, we study the proposed method's robustness against adversarial attacks, that exploit inherent blind spots of neural networks to evade detection while achieving their intended physical effect.  ...  Hence, these systems have become an attractive target for attacks, both physical and cyber.  ...  Elchanan Zwecher for his valuable insights, and Rafael Defense Systems for supporting this work.  ... 
arXiv:1907.01216v2 fatcat:r6d3hpnfyzfvdcuqu7wvu5x2vy

SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism

Mina Zaminkar, Reza Fotohi
2020 Wireless personal communications  
RPL (IP-V6 routing protocol for efficient and low-energy networks) is a standard routing protocol which is mainly employed in sensor networks and IoT.  ...  In these attacks, a malicious node broadcasts illusive information regarding the routings to impose itself as a route towards specific nodes for the neighboring nodes and thus, attract data traffic.  ...  Also, IPV6 is called on over Low-Power Wireless Personal Area Networks 6LoWPAN, which is a wireless sensor network using the compressed IPV6 protocol for networking and IEEE 802.15.4 as the physical layer  ... 
doi:10.1007/s11277-020-07421-z fatcat:eycdrnj2tveivntkucw6t67fb4

SafeChain: Securing Trigger-Action Programming from Attack Chains

Kai-Hsiang Hsu, Yu-Hsi Chiang, Hsu-Chun Hsiao
2019 IEEE Transactions on Information Forensics and Security  
Device owners may end up unintentionally providing access or revealing private information to unauthorized entities due to complex chain reactions among devices.  ...  With IoT sensors and devices communicating with each other via the Internet, people can customize automation rules to meet their needs.  ...  We also would like to thank Yen-Kuang Chen, Wei Jeng and Yujen Chen for contributing to the user studies, and Shin-Min Cheng, Kai-Chung Wang, Tony Tan and Yu-Fang Chen for their help in the app and model  ... 
doi:10.1109/tifs.2019.2899758 fatcat:ygovd7ulxreorc5n4phzj5zkga
« Previous Showing results 1 — 15 out of 319 results