Sciweavers

802 search results - page 1 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
INFOCOM
2007
IEEE
13 years 11 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
ICDCS
2008
IEEE
13 years 11 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
ICNP
2009
IEEE
13 years 2 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
NETWORK
2011
12 years 11 months ago
Selective jamming/dropping insider attacks in wireless mesh networks
—Wireless mesh networks (WMNs) promise to extend high-speed wireless connectivity beyond what is possible with the current WiFi-based infrastructure. However, their unique archit...
Loukas Lazos, Marwan Krunz
GLOBECOM
2010
IEEE
13 years 2 months ago
Identifying Insider-Based Jammers in Multi-Channel Wireless Networks
Abstract-- We consider the problem of identifying insiderbased attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequen...
Hoang Nguyen, Thadpong Pongthawornkamol, Klara Nah...