Academic literature on the topic 'Sensor attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sensor attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Sensor attacks"

1

Yang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (August 5, 2019): 3436. http://dx.doi.org/10.3390/s19153436.

Full text
Abstract:
Herein, the problem of target tracking in wireless sensor networks (WSNs) is investigated in the presence of Byzantine attacks. More specifically, we analyze the impact of Byzantine attacks on the performance of a tracking system. First, under the condition of jointly estimating the target state and the attack parameters, the posterior Cramer–Rao lower bound (PCRLB) is calculated. Then, from the perspective of attackers, we define the optimal Byzantine attack and theoretically find a way to achieve such an attack with minimal cost. When the attacked nodes are correctly identified by the fusion center (FC), we further define the suboptimal Byzantine attack and also find a way to realize such an attack. Finally, in order to alleviate the negative impact of attackers on the system performance, a modified sampling importance resampling (SIR) filter is proposed. Simulation results show that the tracking results of the modified SIR filter can be close to the true trajectory of the moving target. In addition, when the quantization level increases, both the security performance and the estimation performance of the tracking system are improved.
APA, Harvard, Vancouver, ISO, and other styles
2

Singhal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.

Full text
Abstract:
In this paper we propagate the Sybil attack in WSN (Wireless sensor network), by the researchers many attacks have been recognized in WSN till now and there are many attacks which can attack over through internet, Internet of thing means all devices is interconnected to each other M2M over internet and can be attacked by any of the attacker on any devices. Sybil attack is the detrimental attack against sensor network where several counterfeit identities and legitimate identities are used to get prohibited pass in a network. This is major attack which results an information loss and misinterpretation in the network, and it also minimizes the routing disturbance, trustworthiness and dropping sensitivity packets into a network. In this instance node can trust the imaginary node and sharing of information starts, owed to this security of node is get affected and information is lost. In this paper, a survey of CONTIKI OS-2.7, stimulation tool COOJA and the Sybil attack and proposed the defense mechanisms and CAM (Compare and Match) approach to verify the Sybil attack position and prevent it. This Sybil attack can be stimulated on the stimulation tool COOJA which helps to identify the attacker position node, whereas these attacks outcome in uni-casting as well as multicasting and in this paper specifically given the secure security for Wireless sensor network.
APA, Harvard, Vancouver, ISO, and other styles
3

Ghugar, Umashankar, Jayaram Pradhan, Sourav Kumar Bhoi, and Rashmi Ranjan Sahoo. "LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System." Journal of Computer Networks and Communications 2019 (January 6, 2019): 1–13. http://dx.doi.org/10.1155/2019/2054298.

Full text
Abstract:
Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. In this paper, a protocol layer trust-based intrusion detection system (LB-IDS) is proposed to secure the WSN by detecting the attackers at different layers. The trust value of a sensor node is calculated using the deviation of trust metrics at each layer with respect to the attacks. Mainly, we consider trustworthiness in the three layers such as physical layer trust, media access control (MAC) layer trust, and network layer trust. The trust of a sensor node at a particular layer is calculated by taking key trust metrics of that layer. Finally, the overall trust value of the sensor node is estimated by combining the individual trust values of each layer. By applying the trust threshold, a sensor node is detected as trusted or malicious. The performance of LB-IDS is evaluated by comparing the results of the three performance parameters such as detection accuracy, false-positive rate, and false-negative rate, with the results of Wang’s scheme. We have implemented jamming attack at the physical layer, back-off manipulation attack at the MAC layer, and sinkhole attack at the network layer using simulations. We have also implemented a cross-layer attack using the simulation where an attacker simultaneously attacks the MAC layer and network layer. Simulation results show that the proposed LB-IDS performs better as compared with Wang’s scheme.
APA, Harvard, Vancouver, ISO, and other styles
4

Parras, Juan, Maximilian Hüttenrauch, Santiago Zazo, and Gerhard Neumann. "Deep Reinforcement Learning for Attacking Wireless Sensor Networks." Sensors 21, no. 12 (June 12, 2021): 4060. http://dx.doi.org/10.3390/s21124060.

Full text
Abstract:
Recent advances in Deep Reinforcement Learning allow solving increasingly complex problems. In this work, we show how current defense mechanisms in Wireless Sensor Networks are vulnerable to attacks that use these advances. We use a Deep Reinforcement Learning attacker architecture that allows having one or more attacking agents that can learn to attack using only partial observations. Then, we subject our architecture to a test-bench consisting of two defense mechanisms against a distributed spectrum sensing attack and a backoff attack. Our simulations show that our attacker learns to exploit these systems without having a priori information about the defense mechanism used nor its concrete parameters. Since our attacker requires minimal hyper-parameter tuning, scales with the number of attackers, and learns only by interacting with the defense mechanism, it poses a significant threat to current defense procedures.
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Surinder, and Hardeep Singh Saini. "Security Techniques for Wormhole Attack in Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 2.23 (April 20, 2018): 59. http://dx.doi.org/10.14419/ijet.v7i2.23.11884.

Full text
Abstract:
The wireless sensor network has group of sensors which can sense the data and route this data to base station. As there is no physical connection between sensor and base station the important data can be routed without wires. The broadcast nature of wireless sensor network makes it prone to security threat to the valuable data. The attacker node can detect the data by creating their own data aggregation and routing mechanism .The number of attacks can be possible on the network layer. Out of these attacks wormhole is one of the major attack which can change the routing method of the whole wireless sensor network. In this attack,the attacker node can control the packet transmission of whole network and route it to the tunnel of nodes. The major drawback of this attack is to increase the packet drop and disturbing the routing mechanism. A number of security techniques are developed by the researcher to reduce the packet drop ratio and secure the routing mechanism of the network. Out of all thesetechniquesfew related to packet drop ratio are discussed in this paper. TheLightweight countermeasure for the wormhole attack (LITEWORP) based on Dynamic Source routing (DSR) protocol security technique,Delay Per Hop Indication (Delphi) based on AODV(Avoidance Routing Protocol) Protocol security technique and MOBIWORP based on DSRprotocol security technique reduce the packet loss percentage 40%,43% and 35% respectively.
APA, Harvard, Vancouver, ISO, and other styles
6

Vc, Manju, and Dr Sasi Kumar. "Defending Against Denial of Sleep Attack in Wireless Sensor Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 2 (July 20, 2013): 1063–67. http://dx.doi.org/10.24297/ijct.v9i2.4164.

Full text
Abstract:
A wireless sensor network is a wireless network organized with a large number of sensor nodes with specialized sensors that can monitor various physical attributes such as temperature, pressure, vibration, and sound. Sensor nodes are powered up with batteries. Due to unattended nature of the deployment, the sensor nodes’ batteries cannot be recharged. In such conditions, the nodes must optimally consume power. Various protocols are designed to reduce the energy consumption of sensor nodes by keeping the antenna in sleep mode 90% of time, so that power is saved. MAC protocols are designed to adaptively vary the sleep time based on the communication need. But attackers use their knowledge of their underlying MAC protocol, to reduce the sleep time for the node, so that the lifetime of a node reduces. This problem is popularly known as Denial of sleep attack. In this paper, we propose an effective solution }to defend against such attacks in a sensor network. Our proposed solution introduces communication overhead only when the attack is suspected and also the defending mechanism is triggered only in the area of attack. Also the analysis shows that our solution is very strong against SYNC replay attack and jamming attacks.
APA, Harvard, Vancouver, ISO, and other styles
7

Dora, Jean Rosemond, and Karol Nemoga. "Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks." Journal of Cybersecurity and Privacy 1, no. 4 (September 24, 2021): 553–79. http://dx.doi.org/10.3390/jcp1040028.

Full text
Abstract:
The development of the wireless sensor networks technology commonly named WSNs has been gaining a significantly increased amount of attention from researchers over the last few decades. Its large number of sensor nodes is one of the features that makes it beneficial to the technology. The sensors can communicate with each other to form a network. These sensor nodes are generally used for diverse applications, such as pressure monitoring, fire detection, target tracking, and health monitoring, etc. However, the downside is that WSNs are often deployed in hostile, critical environments where they do not restrain physical access. This reality makes them incredibly vulnerable to clone node attacks or node replication attacks. The adversary can capture the legitimate sensor nodes, extract them and then collect some sensitive information, such as node ID, keys and perform a replication attack. This possibility will afterward facilitate the attacker to be able to take control of the whole network and execute the same functions as that of the authorized nodes. Based on this vulnerability, it is of great importance for researchers to invent a detection protocol for the clone attacks as well as a mitigation method. From all of the researches that have been published, a lot of them proposed some techniques to detect the clone node attacks and also to mitigate the attacks. However, almost none of them semantically focused on the security layer establishment. Based on this fact, we proposed an ontology-based approach Ontology for Replication Attacks in Static Wireless Sensor Networks “ORASWSN”, which can semantically be used for the detection and mitigation of the attacks by taking into consideration the importance of using security layers.
APA, Harvard, Vancouver, ISO, and other styles
8

Lalar, Sacachin, Shashi Bhushan, and Surender Surender. "Analysis of Clone Detection Approaches in Static Wireless Sensor Networks." Oriental journal of computer science and technology 10, no. 3 (August 5, 2017): 653–59. http://dx.doi.org/10.13005/ojcst/10.03.14.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are developing very fast in the wireless networks. The wireless sensor network has the characteristics of limited memory, small size and limited battery. WSNs are vulnerable to the different types of attacks due to its characteristics. One of the attacks is clone node attack in which attacker capture the nodes from the network and stoles the information from it and replicates it in the network. From the clone nodes, the attacker can easily launch the different type of attacks in the network. To detect the clone node, different methods has been implemented .Each method having advantages and limitations. In the this paper, we explain the different methods to detect the clone nodes in the static wireless sensor network and compare their performance based on the communication cost and memory.
APA, Harvard, Vancouver, ISO, and other styles
9

Suh and Cho. "An Enhanced Trust Mechanism with Consensus-Based False Information Filtering Algorithm against Bad-Mouthing Attacks and False-Praise Attacks in WSNs." Electronics 8, no. 11 (November 16, 2019): 1359. http://dx.doi.org/10.3390/electronics8111359.

Full text
Abstract:
To defend against insider attacks in wireless sensor networks (WSNs), trust mechanisms (TMs) using the notion of trust in human society have been proposed and are still actively researched. In the WSN with a trust mechanism (TM), each sensor node evaluates the trustworthiness of its neighbor sensors based on their behaviors, for example packet forwarding, and collaborates only with trustworthy neighbors while removing untrustworthy neighbor from its neighbor list. The reputation system (RS) is an advanced type of trust mechanism that evaluates the trustworthiness of a node by additionally considering neighbor nodes’ observations or evaluations about it. However, intelligent inside attackers in WSNs can discover the security vulnerabilities of trust mechanisms by examining the operations of TM (or RS), because the software modules of the TM (or RS) are installed and operating in their local storage and memory, and thus, they can avoid detection by the trust mechanisms. Bad-mouthing attacks and false-praise attacks are well-known examples of such intelligent insider attacks. We observed that existing trust mechanisms do not have effective countermeasures to defend against such attacks. In this paper, we propose an enhanced trust mechanism with a consensus-based false information filtering algorithm (TM-CFIFA) that can effectively defend against bad-mouthing attacks and false-praise attacks. According to our experiment results, compared with an existing representative RS model, our TM-CFIFA shortened the detection time of a packet drop attacker, which is supported by a false-praise attacker by at least 83%, and also extended the lifetime of a victim sensor node that is under bad-mouthing attacks by at least 15.8%.
APA, Harvard, Vancouver, ISO, and other styles
10

Sehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Analysis of AODV protocol under sinkhole attack in wireless sensor network." International Journal of Engineering & Technology 7, no. 2.4 (March 10, 2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.4.13028.

Full text
Abstract:
A Wireless Sensor Network (WSNs) is a collection of number of sensor nodes which are left open in an unsecured environment. Sensor nodes work and communicate together to attain the desired goals. They are placed at the locations where monitoring is otherwise impossible. Wireless Sensor Networks are resource constrained which may be computational power, memory capacity, battery power etc. As Wireless Sensor Networks are implemented in the unattended environment, they are prone to discrete type of security attacks. Because of their limitations these networks are easily targeted by intruders. Sinkhole attack is one of the security attacks which try to disturb the ongoing communication in wireless sensor network. In sinkhole attack, the intruder or the malicious node try to attract the network traffic towards itself, that sensor nodes will pass data packets through this compromised node thereby manipulating messages which sensor nodes are transferring to the base station. In this paper we analyze the impact of Sinkhole attack on AODV protocol under various conditions. We analyzed the impact of Sinkhole attack on AODV protocol with varying number of attacker nodes.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Sensor attacks"

1

Subramanian, Venkatachalam. "Proximity-based attacks in wireless sensor networks." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47610.

Full text
Abstract:
The nodes in wireless sensor networks (WSNs) utilize the radio frequency (RF) channel to communicate. Given that the RF channel is the primary communication channel, many researchers have developed techniques for securing that channel. However, the RF channel is not the only interface into a sensor. The sensing components, which are primarily designed to sense characteristics about the outside world, can also be used (or misused) as a communication (side) channel. In our work, we aim to characterize the side channels for various sensory components (i.e., light sensor, acoustic sensor, and accelerometer). While previous work has focused on the use of these side channels to improve the security and performance of a WSN, we seek to determine if the side channels have enough capacity to potentially be used for malicious activity. Specifically, we evaluate the feasibility and practicality of the side channels using today's sensor technology and illustrate that these channels have enough capacity to enable the transfer of common, well-known malware. Given that a significant number of modern robotic systems depend on the external side channels for navigation and environment-sensing, they become potential targets for side-channel attacks. Therefore, we demonstrate this relatively new form of attack which exploits the uninvestigated but predominantly used side channels to trigger malware residing in real-time robotic systems such as the iRobot Create. The ultimate goal of our work is to show the impact of this new class of attack and also to motivate the need for an intrusion detection system (IDS) that not only monitors the RF channel, but also monitors the values returned by the sensory components.
APA, Harvard, Vancouver, ISO, and other styles
2

Czarlinska, Aleksandra. "Stealthy attacks and defense strategies in competing sensor networks." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alnifie, Ghada Matooq. "A multi-channel defense against communication denial-of-service attacks in wireless networks." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3347.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.
Vita: p. 152. Thesis director: Robert Simon. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science. Title from PDF t.p. (viewed Jan. 8, 2009). Includes bibliographical references (p. 144-151). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Umsonst, David. "Tuning of Anomaly Detectors in the Presence of Sensor Attacks." Licentiate thesis, KTH, Reglerteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259553.

Full text
Abstract:
Critical infrastructures, such as the power grid and water distribution networks, are the backbone of our modern society. With the integration of computational devices and communication networks in critical infrastructures, they have become more efficient, but also more vulnerable to cyberattacks. Due to the underlying physical process, these cyberattacks can not only have a financial and ecological impact, but also cost human lives. Several reported cyberattacks on critical infrastructures show that it is vital to protect them from these attacks. Critical infrastructures typically rely on accurate sensor measurements for optimal performance. In this thesis, we, therefore, look into attacks that corrupt the measurements. The first part of the thesis is concerned with the feasibility of a worst-case sensor attack. The attacker's goal is to maximize its impact, while remaining undetected by an anomaly detector. The investigated worst-case attack strategy needs the exact controller state for its execution. Therefore, we start by looking into the feasibility of estimating the controller state by an attacker that has full model knowledge and access to all sensors. We show that an unstable controller prevents the attacker from estimating the controller state exactly and, therefore, makes the attack non-executable. Since unstable controllers come with their own issues, we propose a defense mechanism based on injecting uncertainty into the controller. Next, we examine the confidentiality of the anomaly detector. With access to the anomaly detector state, the attacker can design a more powerful attack. We show that, in the case of a detector with linear dynamics, the attacker is able to obtain an accurate estimate of the detector’s state. The second part of the thesis is concerned with the performance of anomaly detectors under the investigated attack in the first part. We use a previously proposed metric to compare the performance of a χ2, cumulative sum (CUSUM), and multivariate exponentially weighted moving average (MEWMA) detectors. This metric depends on the attack impact and average time between false alarms. For two different processes, we observe that the CUSUM and MEWMA detectors, which both have internal dynamics, can mitigate the attack impact more than the static χ2 detector. Since this metric depends on the attack impact, which is usually hard to determine, we then propose a new metric. The new metric depends on the number of sensors, and the size of an invariant set guaranteeing that the attack remains undetected. The new metric leads to similar results as the previously proposed metric, but is less dependent on the attack modeling. Finally, we formulate a Stackelberg game to tune the anomaly detector thresholds in a cost-optimal manner, where the cost depends on the number of false alarms and the impact an attack would cause.
Kritiska infrastrukturer, så som elnätet eller vattenförsörjningssystemet, är ryggraden i vårt moderna samhälle. Effektiviteten av kritiska infrastrukturerhar ökats genom integration med beräkningsenheter och kommunikationsnätverk, men detta har medfört att de också har blivit mer sårbara för cyberattacker. På grund av den underliggande fysikaliska processen kan dessa cyberattacker inte bara ha ekonomiska och ekologiska effekter, utan de kan också kosta människoliv. Flera rapporterade cyberattacker mot kritiska infrastrukturer visar att det är viktigt att skydda dem från dessa attacker. Kritiska infrastrukturer förlitar sig vanligtvis på noggranna sensormätningar för optimal prestanda. I denna avhandling undersöker vi därför attacker som korrumperar mätningar. Den första delen av avhandlingen handlar om genomförandet av en sensorattack i ett värstafallsscenario. Angriparens mål är att maximera verkan av attacken, medan den förblir oupptäckt av en feldetektor. Den undersökta värstafallstrategin behöver exakt information av regulatorns tillstånd för att kunna användas. Därför börjar vi med att titta på möjligheten att en angripare ska kunna uppskatta regulatorns tillstånd samtidigt som den känner till modellen och har tillgång till alla sensorer. Vi visar att en instabil regulator förhindrar angriparen från att exakt uppskatta regulatorns tillstånd och därmed förhindrar attacken. Eftersom instabila regulatorer introducerar andra problem, föreslår vi en försvarsmekanism baserad på injektion av osäkerhet i regulatorn. Därefter undersöker vi feldetektorns konfidentialitet. Med kännedom om feldetektorns tillstånd kan angriparen skapa en kraftfullare attack. Vi visar att angriparen kan få en noggrann uppskattning av detektorns tillstånd när detektorn har linjär dynamik. Den andra delen av avhandlingen behandlar feldetektorers prestanda medan de utsätts för de attacker som introducerades i första delen. Vi använder en tidigare föreslagen metrik för att jämföra prestandan av detektorer baserade på χ2-fördelningen, kumulativ summa (CUSUM), och multivariat exponentiellt viktat glidande medelvärde (MEWMA). Denna metrik beror på verkan av attacken och genomsnittlig tid mellan falska larm. Vi observerar att CUSUM- och MEWMA-detektorerna, där båda har intern dynamik, kan begränsa verkan av attacker bättre än vad den statiska χ2-detektorn kan för två olika processer. Eftersom denna metrik beror på attackens verkan, vilket vanligtvis är svårt att fastställa, föreslår vi en ny metrik. Den nya metriken beror på antalet sensorer och storleken på en invariant mängd som garanterar att attacken förblir oupptäckt. Den nya metriken leder till liknande resultat somden tidigare föreslagna metriken, men är mindre beroende av en modell av angriparen. Slutligen formulerar vi ett Stackelberg-spel för att ställa in trösklar för feldetektorn på ett kostnadsoptimalt sätt, där kostnaden beror på antalet falska larm och potentiell verkan av attacker.
APA, Harvard, Vancouver, ISO, and other styles
5

Khanapure, Vishal. "Memory efficient distributed detection of node replication attacks in wireless sensor networks." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0025072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cai, Hang. "Detecting Data Manipulation Attacks on Physiological Sensor Measurements in Wearable Medical Systems." Digital WPI, 2018. https://digitalcommons.wpi.edu/etd-dissertations/502.

Full text
Abstract:
Recent years have seen the dramatic increase of wearable medical systems (WMS) that have demonstrated promise for improving health monitoring and overall well-being. Ensuring that the data collected are secure and trustworthy is crucial. This is especially true in the presence of adversaries who want to mount data manipulation attacks on WMS, which aim to manipulate the sensor measurements with fictitious data that is plausible but not accurate. Such attacks force clinicians or any decision support system AI analyzing the WMS data, to make incorrect diagnosis and treatment decisions about the user’s health. Given that there are different possible vulnerabilities found in WMS that can lead to data manipulation attacks, we take a different angle by developing an attack-agnostic approach, called Signal Interrelationship CApture for Physiological-process (SICAP), to detect data manipulation attacks on physiological sensor measurements in a WMS. SICAP approach leverages the idea that different physiological signals in the user’s body driven by the same underlying physiological process (e.g., cardiac process) are inherently related to each other. By capturing the interrelationship patterns between the related physiological signals, it can detect if any signal is maliciously altered. This is because the incorrect user data introduced by adversaries will have interrelationship patterns that are uncharacteris- tic of the individual’s physiological process and hence quite different from the ones SICAP expects. We demonstrate the efficacy of our approach in detecting data manipulation attacks by building different detection solutions for two commonly measured physiological sensor measurements in a WMS environment – electrocardiogram and arterial blood pressure. The advantage of using this approach is that it allows for detection of data manipulation attacks by taking advantage of different types of physiological sensors, which already exist in typical WMS, thus avoiding the need of redundant sensors of the same type. Furthermore, SICAP approach is not designed to be stand-alone but provides the last line of defense for WMS. It is complementary to, and coexist with, any existing or future security solutions that may be introduced to protect WMS against data manipulation attacks.
APA, Harvard, Vancouver, ISO, and other styles
7

Shaon, Mohammad. "A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks." World Comp,14th International Conference on Wireless Networks, 2015, 2015. http://hdl.handle.net/1993/31981.

Full text
Abstract:
This thesis proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). The aim of the proposed research is to develop a detection scheme that can detect wormhole attacks (In-band, out of band, hidden wormhole attack, active wormhole attack) in both uniformly and non-uniformly distributed sensor networks. Furthermore, the proposed research does not require any special hardware and causes no significant network overhead throughout the network. Most importantly, the probable location of the wormhole nodes can be tracked down by the proposed ANN-based detection scheme. We evaluate the efficacy of the proposed detection scheme in terms of detection accuracy, false positive rate, and false negative rate. The performance of the proposed model is also compared with other machine learning techniques (i.e. SVM and regularized nonlinear logistic regression (LR) based detection models) based detection schemes. The simulation results show that proposed ANN-based detection model outperforms the SVM and LR based detection schemes in terms of detection accuracy, false positive rate, and false negative rates.
February 2017
APA, Harvard, Vancouver, ISO, and other styles
8

JUNG, SANG SHIN. "Attacking and Securing Beacon-Enabled 802.15.4 Networks." Digital Archive @ GSU, 2011. http://digitalarchive.gsu.edu/cs_theses/74.

Full text
Abstract:
The IEEE 802.15.4 has attracted time-critical applications in wireless sensor networks (WSNs) because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS scheme’s security still leave the 802.15.4 MAC vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 either focus on non beacon-enabled 802.15.4 or cannot defend against insider attacks for beacon-enabled 802.15.4. In this thesis, we illustrate this by demonstrating attacks on the availability and integrity of the beacon-enabled 802.15.4. To proof the attacks, we implement the attacks using Tmote Sky motes for a malicious node along with regular nodes. We show that the malicious node can freely exploit the beacon frames to compromise the integrity and availability of the network. For the defense, we present beacon-enabled MiniSec (BCN-MiniSec) and analyze its cost.
APA, Harvard, Vancouver, ISO, and other styles
9

Mouton, Francois. "Digital forensic readiness for wireless sensor network environments." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.

Full text
Abstract:
The new and upcoming field of wireless sensor networking is unfortunately still lacking in terms of both digital forensics and security. All communications between different nodes (also known as motes) are sent out in a broadcast fashion. These broadcasts make it quite difficult to capture data packets forensically and, at the same time, retain their integrity and authenticity. The study presents several attacks that can be executed successfully on a wireless sensor network, after which the dissertation delves more deeply into the flooding attack as it is one of the most difficult attacks to address in wireless sensor networks. Furthermore, a set of factors is presented to take into account while attempting to achieve digital forensic readiness in wireless sensor networks. The set of factors is subsequently discussed critically and a model is proposed for implementing digital forensic readiness in a wireless sensor network. The proposed model is next transformed into a working prototype that is able to provide digital forensic readiness to a wireless sensor network. The main contribution of this research is the digital forensic readiness prototype that can be used to add a digital forensics layer to any existing wireless sensor network. The prototype ensures the integrity and authenticity of each of the data packets captured from the existing wireless sensor network by using the number of motes in the network that have seen a data packet to determine its integrity and authenticity in the network. The prototype also works on different types of wireless sensor networks that are in the frequency range of the network on which the prototype is implemented, and does not require any modifications to be made to the existing wireless sensor network. Flooding attacks pose a major problem in wireless sensor networks due to the broadcasting of communication between motes in wireless sensor networks. The prototype is able to address this problem by using a solution proposed in this dissertation to determine a sudden influx of data packets within a wireless sensor network. The prototype is able to detect flooding attacks while they are occurring and can therefore address the flooding attack immediately. Finally, this dissertation critically discusses the advantages of having such a digital forensic readiness system in place in a wireless sensor network environment. Copyright
Dissertation (MSc)--University of Pretoria, 2012.
Computer Science
unrestricted
APA, Harvard, Vancouver, ISO, and other styles
10

Ben, Jaballah Wafa. "Securing wireless sensor and vehicular networks." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0013/document.

Full text
Abstract:
Les Réseaux de Capteurs Sans Fils (RCSFs) et les réseaux véhiculaires sont de plus en plus répandus, et déployés dans des domaines d’applications variés tels que la santé, la surveillance environnementale, les applications d’alerte d’accident, et les applications militaires. Cependant, ces réseaux peuvent être sujets à des attaques, ce qui empêche leur utilisation à grande échelle. Cette thèse étudie la sécurité des communications pour les réseaux de capteurs sans fils, et les communications inter-véhiculaires. Dans ce but, nous abordons quatre aspects importants. La première étude porte sur l’authentification des messages diffusés dans les réseaux de capteurs. Nous nous concentrons sur les principaux schémas à base de divulgation de clés d’authentification. Nous démontrons que le délai de divulgation de clé induit un délai d’authentification, ce qui pourrait conduire à une attaque de mémoire de déni de service. Nous proposons ensuite deux protocoles d’authentification de la source dans les RCSFs, pour surmonter la vulnérabilité des solutions existantes. Les schémas proposés garantissent la gestion efficace de la mémoire tampon du récepteur, en utilisant un mécanisme d’authentification par niveau, et une structure de Filtre de Bloom afin de réduire le coût de communication. Ensuite, nous validons nos protocoles en utilisant l’outil de vérification AVISPA, et nous les évaluons avec des expérimentations dans l’environment TinyOS. Nous confirmons que ces protocoles fournissent un service d’authentification de la source tout en respectant les contraintes de RCSFs. La seconde étude porte sur le problème de stockage au niveau des capteurs. Nous considérons en particulier l’attaque d’authentification différée “Delayed Authentication Compromise” (DAC) dans les RCSFs, qui permet à un attaquant d’utiliser une clé déjà divulguée pour signer d’autres messages. Nous montrons d’abord que les systèmes récemment proposés qui sont résistants également à l’attaque DAC sont vulnérables aussi à deux types d’attaques: attaque de permutation de commandes (où un adversaire prétend “permuter” deux messages au fil du temps), et l’attaque de rejet de commandes (où un adversaire semble “cacher” un message envoyé par la station de base). Nous proposons ensuite une nouvelle solution d’authentification. Notre analyse montre que notre solution est efficace pour détecter à la fois l’attaque de permutation de commandes et l’attaque de rejet de commandes, — et en même temps — est plus efficace (en termes de communication et de calcul) que les solutions existantes. xxiDans la troisième étude, nous considérons le problème de la sécurité de la gestion des clés dans les réseaux de capteurs. Nous présentons de nouveaux schémas d’authentification à base de clés symétriques qui présentent un faible coût d’authentification et de communication. Nos systèmes sont construits en intégrant un mécanisme de réputation, un filtre de Bloom, et un arbre binaire de clés pour la distribution et la mise à jour des clés d’authentification. Nos schémas d’authentification sont efficaces en matière de communication et de consommation de l’énergie. La quatrième étude porte sur la sécurité des communications véhiculaires. Nous nous concentrons sur les applications d’alerte d’accident. Nous analysons les menaces pour un ensemble d’algorithmes. Nous démontrons que ces systèmes sont vulnérables à l’attaque d’injection d’une fausse position, à l’attaque de rejeu de message d’alerte, et à l’attaque d’interruption de message d’alerte. Ensuite, nous proposons des contre-mesures à ces menaces. Nous avons donc proposé une solution qui est à la fois rapide et sécurisée pour les applications d’alerte d’accident : Un algorithme rapide et sécurisé pour la diffusion des messages en multi-saut (FS-MBA). Enfin, nous confirmons l’efficacité et la faisabilité des différents protocoles en effectuant un ensemble de simulations sous le simulateur NS-2
Wireless sensor and vehicular networks play an important role in critical military and civil applications, and pervade our daily life. However, security concerns constitute a potential stumbling block to the impeding wide deployment of sensor networks and vehicular communications. This dissertation studies communication security for Wireless Sensor Networks (WSNs), and vehicular communication. To this aim, we address four important aspects. The first study addresses broadcast authentication in WSNs. We focus on key disclosure based schemes. We demonstrate that key disclosure delay induces an authentication delay, which could lead to a memory DoS attack. We then propose two broadcastauthentication protocols for WSNs, which overcome the security vulnerability of existingsolutions. The proposed schemes guarantee the efficient management of receiver’s buffer, by employing a staggered authentication mechanism, and a Bloom filter data structure to reduce the communication overhead. We also validate our protocols under the AVISPA model checking tool, and we evaluate them with experiments under TinyOS. Our findings are that these protocols provide source authentication service while respecting the WSN constraints.The second study addresses the storage issue in WSNs, in particular the Delayed AuthenticationCompromise attack (DAC). We first demonstrate that recently proposed schemes, which also address the DAC issue are vulnerable to two kinds of attacks: switch command attack (where an adversary pretends to “switch” two messages over time), and drop command attack (where an adversary just pretends to “hide” a message sent from the broadcaster). As a countermeasure against these attacks, we propose a new solution for broadcast authentication. Our analysis shows that our solution is effective in detecting both switch command and drop command attack, and—at the same time—is more efficient (in terms of both communication and computation) than the state of the art solutions.In the third study, we address key management security in WSNs. We present novel symmetric-key-based authentication schemes which exhibit low computation and communication authentication overhead. Our schemes are built upon the integration of a reputation mechanism, a Bloom filter, and a key binary tree for the distribution and updating of the auxviii thentication keys. Our schemes are lightweight and efficient with respect to communication and energy overhead. The fourth study addresses security in vehicular communications. We focus on fast multi hop broadcast applications. We analyze the security threats of state of the art vehicular based safety applications. We demonstrate that these schemes are vulnerable to the position cheating attack, the replay broadcast message attack, and the interrupting forwarding attack. Then, we propose countermeasures for these threats. We hence propose a complete solution which is both fast and secure in broadcasting safety related messages: Fast and Secure Multi-hop Broadcast Algorithm (FS-MBA). Finally, we confirm the efficiency and feasibility of our proposals using an extensive set of simulations under NS-2 Simulator
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Sensor attacks"

1

K, Kokula Krishna Hari, ed. Early Detection and Prevention of Vampire Attacks in Wireless Sensor Networks: ICIEMS 2014. India: Association of Scientists, Developers and Faculties, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haberlin, Richard J. Analysis of unattended ground sensors in theater Missile Defense Attack Operations. Monterey, Calif: Naval Postgraduate School, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wong, Douglas T. Evaluation of electrolytic tilt sensors for measuring model angle of attack in wind tunnel tests. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shinjuwan kōgeki no shinjitsu: Truth of the Pearl Harbor attack. Tōkyō: PHP Kenkyūjo, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hsieh, Esther. Development of a portable spectroscopic sensor to measure wood and fibre properties in standing mountain pine beetle-attacked trees and decked logs. Victoria, B.C: Pacific Forestry Centre, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

New Jersey. Legislature. General Assembly. Committee on Senior Citizens. Committee meeting of Assembly Senior Issues Committee: Assembly bill no. 2023 (requires certain background checks for assisted living administrators and applicants for certificate of need) : Assembly concurrent resolution no. 92 (memorializes federal Office of Homeland Security to examine needs of senior citizens in event of terrorist attacks) : Assembly concurrent resolution no. 93 (urges Domestic Security Preparedness Task Force and Domestic Security Preparedness Planning Group to examine needs of senior citizens in event of terrorist attacks). Trenton, N.J: Office of Legislative Services, Public Information Office, Hearing Unit, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shinjuwan kōgeki, zenkiroku: Nihon Kaigun, shōri no genkaiten. Tōkyō: Gendai Shokan, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shinjuwan o kataru: Rekishi, kioku, kyōiku. Tōkyō: Tōkyō Daigaku Shuppankai, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sensor Systems for Biological Agent Attacks. Washington, D.C.: National Academies Press, 2005. http://dx.doi.org/10.17226/11207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

National Research Council (U.S.), ed. Sensor systems for biological agent attacks: Protecting buildings and military bases. Washington, D.C: National Academies Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Sensor attacks"

1

Nagireddy, Vyshnavi, and Pritee Parwekar. "Attacks in Wireless Sensor Networks." In Smart Intelligent Computing and Applications, 439–47. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1927-3_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Xun, Wenjun Gu, Kurt Schosek, Sriram Chellappan, and Dong Xuan. "Sensor Network Configuration Under Physical Attacks." In Networking and Mobile Computing, 23–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11534310_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cai, Hang, and Krishna K. Venkatasubramanian. "Data-Driven Detection of Sensor-Hijacking Attacks on Electrocardiogram Sensors." In Mission-Oriented Sensor Networks and Systems: Art and Science, 757–81. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-91146-5_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Satchidanandan, Bharadwaj, and P. R. Kumar. "Defending Cyber-Physical Systems from Sensor Attacks." In Lecture Notes in Computer Science, 150–76. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67235-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

de Souza, Tulio, Joss Wright, Piers O’Hanlon, and Ian Brown. "Set Difference Attacks in Wireless Sensor Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 94–111. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36883-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stojanovski, Spase, and Andrea Kulakov. "Efficient Attacks in Industrial Wireless Sensor Networks." In ICT Innovations 2014, 289–98. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-09879-1_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ghosal, Amrita, and Subir Halder. "Security in Mobile Wireless Sensor Networks: Attacks and Defenses." In Cooperative Robots and Sensor Networks 2015, 185–205. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18299-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dziembowski, Stefan, Alessandro Mei, and Alessandro Panconesi. "On Active Attacks on Sensor Network Key Distribution Schemes." In Algorithmic Aspects of Wireless Sensor Networks, 52–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05434-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

D’Arco, Paolo, Alessandra Scafuro, and Ivan Visconti. "Revisiting DoS Attacks and Privacy in RFID-Enabled Networks." In Algorithmic Aspects of Wireless Sensor Networks, 76–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05434-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Jialong, Jiyong Jang, Guofei Gu, Marc Ph Stoecklin, and Xin Hu. "Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence." In Research in Attacks, Intrusions, and Defenses, 467–89. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00470-5_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Sensor attacks"

1

Ghafouri, Amin, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. "Adversarial Regression for Detecting Attacks in Cyber-Physical Systems." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/524.

Full text
Abstract:
Attacks in cyber-physical systems (CPS) which manipulate sensor readings can cause enormous physical damage if undetected. Detection of attacks on sensors is crucial to mitigate this issue. We study supervised regression as a means to detect anomalous sensor readings, where each sensor's measurement is predicted as a function of other sensors. We show that several common learning approaches in this context are still vulnerable to stealthy attacks, which carefully modify readings of compromised sensors to cause desired damage while remaining undetected. Next, we model the interaction between the CPS defender and attacker as a Stackelberg game in which the defender chooses detection thresholds, while the attacker deploys a stealthy attack in response. We present a heuristic algorithm for finding an approximately optimal threshold for the defender in this game, and show that it increases system resilience to attacks without significantly increasing the false alarm rate.
APA, Harvard, Vancouver, ISO, and other styles
2

Sokullu, Radosveta, Orhan Dagdeviren, and Ilker Korkmaz. "On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack." In 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008). IEEE, 2008. http://dx.doi.org/10.1109/sensorcomm.2008.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maccarone, Lee T., and Daniel G. Cole. "A Game-Theoretic Approach to Defending Nuclear Instrumentation and Control Systems From Cyber-Threats." In ASME 2018 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/imece2018-87713.

Full text
Abstract:
Cyber-physical systems consist of interconnected physical processes and computational resources. Because the cyber and physical worlds are integrated, the system’s physical assets are vulnerable to cyber-attack. An attacker who is able to access control inputs and mask measurements can damage the system while remaining undetected. By masking certain measurement signals, an attacker may render part of the state space unobservable, meaning that it is impossible to reconstruct those states. This is called an observability attack. A game-theoretic approach is presented to analyze observability attacks. The attacker’s strategy set includes all possible combinations of masked measurements. The defender’s strategy set includes redundant sensing and direct measurement of state variables. Attacker and defender payoffs are quantified using the responses of the observable and unobservable states. The observability attack game is analyzed for a nuclear balance of plant system. Combinations of sensor omissions are analyzed to find observability attacks with high impact and low detection. The effects of sensor augmentation are examined. A pure strategy Nash equilibrium is identified.
APA, Harvard, Vancouver, ISO, and other styles
4

Manzo, Michael, Tanya Roosta, and Shankar Sastry. "Time synchronization attacks in sensor networks." In the 3rd ACM workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1102219.1102238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Ziyi. "Attack and Defense Game Strategy of Wireless Sensor Networks under Multiple Attacks." In 2019 Chinese Control Conference (CCC). IEEE, 2019. http://dx.doi.org/10.23919/chicc.2019.8866329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pu, Hongyi, Liang He, Chengcheng Zhao, David K. Y. Yau, Peng Cheng, and Jiming Chen. "Detecting replay attacks against industrial robots via power fingerprinting." In SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3384419.3430775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Bo-Rong, and Yih-Chun Hu. "Mitigating denial-of-service attacks on digital contact tracing." In SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3384419.3430599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Syed Obaid Amin, Muhammad Shoaib Siddiqui, and Choong Seon Hong. "Detecting jamming attacks in Ubiquitous Sensor Networks." In SAS2008 - IEEE Sensors Applications Symposium. IEEE, 2008. http://dx.doi.org/10.1109/sas13374.2008.4472940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kaplantzis, Sophia, Alistair Shilton, Nallasamy Mani, and Y. Ahmet Sekercioglu. "Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines." In 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, 2007. http://dx.doi.org/10.1109/issnip.2007.4496866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Yi, Sencun Zhu, and Guohong Cao. "Improving sensor network immunity under worm attacks." In the 9th ACM international symposium. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1374618.1374640.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Sensor attacks"

1

Fekri, Faramarz, E. Ayday, and R. Subramanian. Design Principles for Secure Wireless Sensor Networks: Key Management Schemes and Malicious Attacks. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada533169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

DoD Office of Inspector General. Joint Land Attack Cruise Missile Defense Elevated Netted Sensor System Not Ready for Production Decision (REDACTED). Fort Belvoir, VA: Defense Technical Information Center, September 2012. http://dx.doi.org/10.21236/ad1016443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Berney, Ernest, Naveen Ganesh, Andrew Ward, J. Newman, and John Rushing. Methodology for remote assessment of pavement distresses from point cloud analysis. Engineer Research and Development Center (U.S.), April 2021. http://dx.doi.org/10.21079/11681/40401.

Full text
Abstract:
The ability to remotely assess road and airfield pavement condition is critical to dynamic basing, contingency deployment, convoy entry and sustainment, and post-attack reconnaissance. Current Army processes to evaluate surface condition are time-consuming and require Soldier presence. Recent developments in the area of photogrammetry and light detection and ranging (LiDAR) enable rapid generation of three-dimensional point cloud models of the pavement surface. Point clouds were generated from data collected on a series of asphalt, concrete, and unsurfaced pavements using ground- and aerial-based sensors. ERDC-developed algorithms automatically discretize the pavement surface into cross- and grid-based sections to identify physical surface distresses such as depressions, ruts, and cracks. Depressions can be sized from the point-to-point distances bounding each depression, and surface roughness is determined based on the point heights along a given cross section. Noted distresses are exported to a distress map file containing only the distress points and their locations for later visualization and quality control along with classification and quantification. Further research and automation into point cloud analysis is ongoing with the goal of enabling Soldiers with limited training the capability to rapidly assess pavement surface condition from a remote platform.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography