Sciweavers

802 search results - page 4 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
JSAC
2010
188views more  JSAC 2010»
13 years 2 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
WOWMOM
2006
ACM
150views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
Abstract— A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryp...
Murat Demirbas, Youngwhan Song
AINA
2007
IEEE
13 years 7 months ago
Detecting Anomaly Node Behavior in Wireless Sensor Networks
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...
Qinghua Wang, Tingting Zhang
INFOCOM
2007
IEEE
14 years 2 months ago
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks
Abstract— We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmi...
Mingyan Li, Iordanis Koutsopoulos, Radha Poovendra...