Sciweavers

802 search results - page 5 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Attack-Tolerant Time-Synchronization in Wireless Sensor Networks
—Achieving secure time-synchronization in wireless sensor networks (WSNs) is a challenging, but very important problem that has not yet been addressed effectively. This paper pro...
Xin Hu, Taejoon Park, Kang G. Shin
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 2 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ADHOCNETS
2009
Springer
14 years 2 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
TMC
2008
109views more  TMC 2008»
13 years 7 months ago
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is define...
Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang, Dhar...
IJNSEC
2007
171views more  IJNSEC 2007»
13 years 7 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das