Sciweavers

736 search results - page 11 / 148
» Detecting Wormhole Attacks in Wireless Sensor Networks
Sort
View
PERCOM
2006
ACM
15 years 9 months ago
Resilient Aggregation with Attack Detection in Sensor Networks
In this paper, we propose a new model of resilient data aggregation in sensor networks, where the aggregator analyzes the received sensor readings and tries to detect unexpected d...
Levente Buttyán, Péter Schaffer, Ist...
MOBILIGHT
2010
14 years 4 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
14 years 4 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
ADHOC
2007
164views more  ADHOC 2007»
14 years 9 months ago
Attack-resilient time synchronization for wireless sensor networks
The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first id...
Hui Song, Sencun Zhu, Guohong Cao
MSWIM
2005
ACM
15 years 3 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...