Sciweavers

802 search results - page 25 / 161
» Insider Attacker Detection in Wireless Sensor Networks
Sort
View
AINA
2009
IEEE
15 years 1 months ago
Adaptive and Online One-Class Support Vector Machine-Based Outlier Detection Techniques for Wireless Sensor Networks
Outlier detection in wireless sensor networks is essential to ensure data quality, secure monitoring and reliable detection of interesting and critical events. A key challenge for...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga
PERCOM
2006
ACM
15 years 10 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra
APIN
2010
172views more  APIN 2010»
14 years 11 months ago
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm
The objective of this paper is to investigate how a Danger Theory based Artificial Immune System--in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor ...
Christian Wallenta, Jungwon Kim, Peter J. Bentley,...
CCS
2010
ACM
15 years 10 days ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
MOBIHOC
2005
ACM
15 years 10 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...