Academic literature on the topic 'Sensor attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sensor attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Sensor attacks"
Yang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (August 5, 2019): 3436. http://dx.doi.org/10.3390/s19153436.
Full textSinghal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.
Full textGhugar, Umashankar, Jayaram Pradhan, Sourav Kumar Bhoi, and Rashmi Ranjan Sahoo. "LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System." Journal of Computer Networks and Communications 2019 (January 6, 2019): 1–13. http://dx.doi.org/10.1155/2019/2054298.
Full textParras, Juan, Maximilian Hüttenrauch, Santiago Zazo, and Gerhard Neumann. "Deep Reinforcement Learning for Attacking Wireless Sensor Networks." Sensors 21, no. 12 (June 12, 2021): 4060. http://dx.doi.org/10.3390/s21124060.
Full textSingh, Surinder, and Hardeep Singh Saini. "Security Techniques for Wormhole Attack in Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 2.23 (April 20, 2018): 59. http://dx.doi.org/10.14419/ijet.v7i2.23.11884.
Full textVc, Manju, and Dr Sasi Kumar. "Defending Against Denial of Sleep Attack in Wireless Sensor Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 2 (July 20, 2013): 1063–67. http://dx.doi.org/10.24297/ijct.v9i2.4164.
Full textDora, Jean Rosemond, and Karol Nemoga. "Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks." Journal of Cybersecurity and Privacy 1, no. 4 (September 24, 2021): 553–79. http://dx.doi.org/10.3390/jcp1040028.
Full textLalar, Sacachin, Shashi Bhushan, and Surender Surender. "Analysis of Clone Detection Approaches in Static Wireless Sensor Networks." Oriental journal of computer science and technology 10, no. 3 (August 5, 2017): 653–59. http://dx.doi.org/10.13005/ojcst/10.03.14.
Full textSuh and Cho. "An Enhanced Trust Mechanism with Consensus-Based False Information Filtering Algorithm against Bad-Mouthing Attacks and False-Praise Attacks in WSNs." Electronics 8, no. 11 (November 16, 2019): 1359. http://dx.doi.org/10.3390/electronics8111359.
Full textSehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Analysis of AODV protocol under sinkhole attack in wireless sensor network." International Journal of Engineering & Technology 7, no. 2.4 (March 10, 2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.4.13028.
Full textDissertations / Theses on the topic "Sensor attacks"
Subramanian, Venkatachalam. "Proximity-based attacks in wireless sensor networks." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47610.
Full textCzarlinska, Aleksandra. "Stealthy attacks and defense strategies in competing sensor networks." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2946.
Full textAlnifie, Ghada Matooq. "A multi-channel defense against communication denial-of-service attacks in wireless networks." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3347.
Full textVita: p. 152. Thesis director: Robert Simon. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science. Title from PDF t.p. (viewed Jan. 8, 2009). Includes bibliographical references (p. 144-151). Also issued in print.
Umsonst, David. "Tuning of Anomaly Detectors in the Presence of Sensor Attacks." Licentiate thesis, KTH, Reglerteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259553.
Full textKritiska infrastrukturer, så som elnätet eller vattenförsörjningssystemet, är ryggraden i vårt moderna samhälle. Effektiviteten av kritiska infrastrukturerhar ökats genom integration med beräkningsenheter och kommunikationsnätverk, men detta har medfört att de också har blivit mer sårbara för cyberattacker. På grund av den underliggande fysikaliska processen kan dessa cyberattacker inte bara ha ekonomiska och ekologiska effekter, utan de kan också kosta människoliv. Flera rapporterade cyberattacker mot kritiska infrastrukturer visar att det är viktigt att skydda dem från dessa attacker. Kritiska infrastrukturer förlitar sig vanligtvis på noggranna sensormätningar för optimal prestanda. I denna avhandling undersöker vi därför attacker som korrumperar mätningar. Den första delen av avhandlingen handlar om genomförandet av en sensorattack i ett värstafallsscenario. Angriparens mål är att maximera verkan av attacken, medan den förblir oupptäckt av en feldetektor. Den undersökta värstafallstrategin behöver exakt information av regulatorns tillstånd för att kunna användas. Därför börjar vi med att titta på möjligheten att en angripare ska kunna uppskatta regulatorns tillstånd samtidigt som den känner till modellen och har tillgång till alla sensorer. Vi visar att en instabil regulator förhindrar angriparen från att exakt uppskatta regulatorns tillstånd och därmed förhindrar attacken. Eftersom instabila regulatorer introducerar andra problem, föreslår vi en försvarsmekanism baserad på injektion av osäkerhet i regulatorn. Därefter undersöker vi feldetektorns konfidentialitet. Med kännedom om feldetektorns tillstånd kan angriparen skapa en kraftfullare attack. Vi visar att angriparen kan få en noggrann uppskattning av detektorns tillstånd när detektorn har linjär dynamik. Den andra delen av avhandlingen behandlar feldetektorers prestanda medan de utsätts för de attacker som introducerades i första delen. Vi använder en tidigare föreslagen metrik för att jämföra prestandan av detektorer baserade på χ2-fördelningen, kumulativ summa (CUSUM), och multivariat exponentiellt viktat glidande medelvärde (MEWMA). Denna metrik beror på verkan av attacken och genomsnittlig tid mellan falska larm. Vi observerar att CUSUM- och MEWMA-detektorerna, där båda har intern dynamik, kan begränsa verkan av attacker bättre än vad den statiska χ2-detektorn kan för två olika processer. Eftersom denna metrik beror på attackens verkan, vilket vanligtvis är svårt att fastställa, föreslår vi en ny metrik. Den nya metriken beror på antalet sensorer och storleken på en invariant mängd som garanterar att attacken förblir oupptäckt. Den nya metriken leder till liknande resultat somden tidigare föreslagna metriken, men är mindre beroende av en modell av angriparen. Slutligen formulerar vi ett Stackelberg-spel för att ställa in trösklar för feldetektorn på ett kostnadsoptimalt sätt, där kostnaden beror på antalet falska larm och potentiell verkan av attacker.
Khanapure, Vishal. "Memory efficient distributed detection of node replication attacks in wireless sensor networks." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0025072.
Full textCai, Hang. "Detecting Data Manipulation Attacks on Physiological Sensor Measurements in Wearable Medical Systems." Digital WPI, 2018. https://digitalcommons.wpi.edu/etd-dissertations/502.
Full textShaon, Mohammad. "A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks." World Comp,14th International Conference on Wireless Networks, 2015, 2015. http://hdl.handle.net/1993/31981.
Full textFebruary 2017
JUNG, SANG SHIN. "Attacking and Securing Beacon-Enabled 802.15.4 Networks." Digital Archive @ GSU, 2011. http://digitalarchive.gsu.edu/cs_theses/74.
Full textMouton, Francois. "Digital forensic readiness for wireless sensor network environments." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.
Full textDissertation (MSc)--University of Pretoria, 2012.
Computer Science
unrestricted
Ben, Jaballah Wafa. "Securing wireless sensor and vehicular networks." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0013/document.
Full textWireless sensor and vehicular networks play an important role in critical military and civil applications, and pervade our daily life. However, security concerns constitute a potential stumbling block to the impeding wide deployment of sensor networks and vehicular communications. This dissertation studies communication security for Wireless Sensor Networks (WSNs), and vehicular communication. To this aim, we address four important aspects. The first study addresses broadcast authentication in WSNs. We focus on key disclosure based schemes. We demonstrate that key disclosure delay induces an authentication delay, which could lead to a memory DoS attack. We then propose two broadcastauthentication protocols for WSNs, which overcome the security vulnerability of existingsolutions. The proposed schemes guarantee the efficient management of receiver’s buffer, by employing a staggered authentication mechanism, and a Bloom filter data structure to reduce the communication overhead. We also validate our protocols under the AVISPA model checking tool, and we evaluate them with experiments under TinyOS. Our findings are that these protocols provide source authentication service while respecting the WSN constraints.The second study addresses the storage issue in WSNs, in particular the Delayed AuthenticationCompromise attack (DAC). We first demonstrate that recently proposed schemes, which also address the DAC issue are vulnerable to two kinds of attacks: switch command attack (where an adversary pretends to “switch” two messages over time), and drop command attack (where an adversary just pretends to “hide” a message sent from the broadcaster). As a countermeasure against these attacks, we propose a new solution for broadcast authentication. Our analysis shows that our solution is effective in detecting both switch command and drop command attack, and—at the same time—is more efficient (in terms of both communication and computation) than the state of the art solutions.In the third study, we address key management security in WSNs. We present novel symmetric-key-based authentication schemes which exhibit low computation and communication authentication overhead. Our schemes are built upon the integration of a reputation mechanism, a Bloom filter, and a key binary tree for the distribution and updating of the auxviii thentication keys. Our schemes are lightweight and efficient with respect to communication and energy overhead. The fourth study addresses security in vehicular communications. We focus on fast multi hop broadcast applications. We analyze the security threats of state of the art vehicular based safety applications. We demonstrate that these schemes are vulnerable to the position cheating attack, the replay broadcast message attack, and the interrupting forwarding attack. Then, we propose countermeasures for these threats. We hence propose a complete solution which is both fast and secure in broadcasting safety related messages: Fast and Secure Multi-hop Broadcast Algorithm (FS-MBA). Finally, we confirm the efficiency and feasibility of our proposals using an extensive set of simulations under NS-2 Simulator
Books on the topic "Sensor attacks"
K, Kokula Krishna Hari, ed. Early Detection and Prevention of Vampire Attacks in Wireless Sensor Networks: ICIEMS 2014. India: Association of Scientists, Developers and Faculties, 2014.
Find full textHaberlin, Richard J. Analysis of unattended ground sensors in theater Missile Defense Attack Operations. Monterey, Calif: Naval Postgraduate School, 1997.
Find full textWong, Douglas T. Evaluation of electrolytic tilt sensors for measuring model angle of attack in wind tunnel tests. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1992.
Find full textShinjuwan kōgeki no shinjitsu: Truth of the Pearl Harbor attack. Tōkyō: PHP Kenkyūjo, 2009.
Find full textHsieh, Esther. Development of a portable spectroscopic sensor to measure wood and fibre properties in standing mountain pine beetle-attacked trees and decked logs. Victoria, B.C: Pacific Forestry Centre, 2006.
Find full textNew Jersey. Legislature. General Assembly. Committee on Senior Citizens. Committee meeting of Assembly Senior Issues Committee: Assembly bill no. 2023 (requires certain background checks for assisted living administrators and applicants for certificate of need) : Assembly concurrent resolution no. 92 (memorializes federal Office of Homeland Security to examine needs of senior citizens in event of terrorist attacks) : Assembly concurrent resolution no. 93 (urges Domestic Security Preparedness Task Force and Domestic Security Preparedness Planning Group to examine needs of senior citizens in event of terrorist attacks). Trenton, N.J: Office of Legislative Services, Public Information Office, Hearing Unit, 2002.
Find full textShinjuwan kōgeki, zenkiroku: Nihon Kaigun, shōri no genkaiten. Tōkyō: Gendai Shokan, 2010.
Find full textSensor Systems for Biological Agent Attacks. Washington, D.C.: National Academies Press, 2005. http://dx.doi.org/10.17226/11207.
Full textNational Research Council (U.S.), ed. Sensor systems for biological agent attacks: Protecting buildings and military bases. Washington, D.C: National Academies Press, 2005.
Find full textBook chapters on the topic "Sensor attacks"
Nagireddy, Vyshnavi, and Pritee Parwekar. "Attacks in Wireless Sensor Networks." In Smart Intelligent Computing and Applications, 439–47. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1927-3_47.
Full textWang, Xun, Wenjun Gu, Kurt Schosek, Sriram Chellappan, and Dong Xuan. "Sensor Network Configuration Under Physical Attacks." In Networking and Mobile Computing, 23–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11534310_5.
Full textCai, Hang, and Krishna K. Venkatasubramanian. "Data-Driven Detection of Sensor-Hijacking Attacks on Electrocardiogram Sensors." In Mission-Oriented Sensor Networks and Systems: Art and Science, 757–81. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-91146-5_20.
Full textSatchidanandan, Bharadwaj, and P. R. Kumar. "Defending Cyber-Physical Systems from Sensor Attacks." In Lecture Notes in Computer Science, 150–76. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67235-9_11.
Full textde Souza, Tulio, Joss Wright, Piers O’Hanlon, and Ian Brown. "Set Difference Attacks in Wireless Sensor Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 94–111. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36883-7_7.
Full textStojanovski, Spase, and Andrea Kulakov. "Efficient Attacks in Industrial Wireless Sensor Networks." In ICT Innovations 2014, 289–98. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-09879-1_29.
Full textGhosal, Amrita, and Subir Halder. "Security in Mobile Wireless Sensor Networks: Attacks and Defenses." In Cooperative Robots and Sensor Networks 2015, 185–205. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18299-5_9.
Full textDziembowski, Stefan, Alessandro Mei, and Alessandro Panconesi. "On Active Attacks on Sensor Network Key Distribution Schemes." In Algorithmic Aspects of Wireless Sensor Networks, 52–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05434-1_7.
Full textD’Arco, Paolo, Alessandra Scafuro, and Ivan Visconti. "Revisiting DoS Attacks and Privacy in RFID-Enabled Networks." In Algorithmic Aspects of Wireless Sensor Networks, 76–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05434-1_9.
Full textZhang, Jialong, Jiyong Jang, Guofei Gu, Marc Ph Stoecklin, and Xin Hu. "Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence." In Research in Attacks, Intrusions, and Defenses, 467–89. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00470-5_22.
Full textConference papers on the topic "Sensor attacks"
Ghafouri, Amin, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. "Adversarial Regression for Detecting Attacks in Cyber-Physical Systems." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/524.
Full textSokullu, Radosveta, Orhan Dagdeviren, and Ilker Korkmaz. "On the IEEE 802.15.4 MAC Layer Attacks: GTS Attack." In 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008). IEEE, 2008. http://dx.doi.org/10.1109/sensorcomm.2008.75.
Full textMaccarone, Lee T., and Daniel G. Cole. "A Game-Theoretic Approach to Defending Nuclear Instrumentation and Control Systems From Cyber-Threats." In ASME 2018 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/imece2018-87713.
Full textManzo, Michael, Tanya Roosta, and Shankar Sastry. "Time synchronization attacks in sensor networks." In the 3rd ACM workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1102219.1102238.
Full textYang, Ziyi. "Attack and Defense Game Strategy of Wireless Sensor Networks under Multiple Attacks." In 2019 Chinese Control Conference (CCC). IEEE, 2019. http://dx.doi.org/10.23919/chicc.2019.8866329.
Full textPu, Hongyi, Liang He, Chengcheng Zhao, David K. Y. Yau, Peng Cheng, and Jiming Chen. "Detecting replay attacks against industrial robots via power fingerprinting." In SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3384419.3430775.
Full textChen, Bo-Rong, and Yih-Chun Hu. "Mitigating denial-of-service attacks on digital contact tracing." In SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3384419.3430599.
Full textSyed Obaid Amin, Muhammad Shoaib Siddiqui, and Choong Seon Hong. "Detecting jamming attacks in Ubiquitous Sensor Networks." In SAS2008 - IEEE Sensors Applications Symposium. IEEE, 2008. http://dx.doi.org/10.1109/sas13374.2008.4472940.
Full textKaplantzis, Sophia, Alistair Shilton, Nallasamy Mani, and Y. Ahmet Sekercioglu. "Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines." In 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, 2007. http://dx.doi.org/10.1109/issnip.2007.4496866.
Full textYang, Yi, Sencun Zhu, and Guohong Cao. "Improving sensor network immunity under worm attacks." In the 9th ACM international symposium. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1374618.1374640.
Full textReports on the topic "Sensor attacks"
Fekri, Faramarz, E. Ayday, and R. Subramanian. Design Principles for Secure Wireless Sensor Networks: Key Management Schemes and Malicious Attacks. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada533169.
Full textDoD Office of Inspector General. Joint Land Attack Cruise Missile Defense Elevated Netted Sensor System Not Ready for Production Decision (REDACTED). Fort Belvoir, VA: Defense Technical Information Center, September 2012. http://dx.doi.org/10.21236/ad1016443.
Full textBerney, Ernest, Naveen Ganesh, Andrew Ward, J. Newman, and John Rushing. Methodology for remote assessment of pavement distresses from point cloud analysis. Engineer Research and Development Center (U.S.), April 2021. http://dx.doi.org/10.21079/11681/40401.
Full text