Dissertations / Theses on the topic 'Sensor attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Sensor attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Subramanian, Venkatachalam. "Proximity-based attacks in wireless sensor networks." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47610.
Full textCzarlinska, Aleksandra. "Stealthy attacks and defense strategies in competing sensor networks." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2946.
Full textAlnifie, Ghada Matooq. "A multi-channel defense against communication denial-of-service attacks in wireless networks." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3347.
Full textVita: p. 152. Thesis director: Robert Simon. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science. Title from PDF t.p. (viewed Jan. 8, 2009). Includes bibliographical references (p. 144-151). Also issued in print.
Umsonst, David. "Tuning of Anomaly Detectors in the Presence of Sensor Attacks." Licentiate thesis, KTH, Reglerteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259553.
Full textKritiska infrastrukturer, så som elnätet eller vattenförsörjningssystemet, är ryggraden i vårt moderna samhälle. Effektiviteten av kritiska infrastrukturerhar ökats genom integration med beräkningsenheter och kommunikationsnätverk, men detta har medfört att de också har blivit mer sårbara för cyberattacker. På grund av den underliggande fysikaliska processen kan dessa cyberattacker inte bara ha ekonomiska och ekologiska effekter, utan de kan också kosta människoliv. Flera rapporterade cyberattacker mot kritiska infrastrukturer visar att det är viktigt att skydda dem från dessa attacker. Kritiska infrastrukturer förlitar sig vanligtvis på noggranna sensormätningar för optimal prestanda. I denna avhandling undersöker vi därför attacker som korrumperar mätningar. Den första delen av avhandlingen handlar om genomförandet av en sensorattack i ett värstafallsscenario. Angriparens mål är att maximera verkan av attacken, medan den förblir oupptäckt av en feldetektor. Den undersökta värstafallstrategin behöver exakt information av regulatorns tillstånd för att kunna användas. Därför börjar vi med att titta på möjligheten att en angripare ska kunna uppskatta regulatorns tillstånd samtidigt som den känner till modellen och har tillgång till alla sensorer. Vi visar att en instabil regulator förhindrar angriparen från att exakt uppskatta regulatorns tillstånd och därmed förhindrar attacken. Eftersom instabila regulatorer introducerar andra problem, föreslår vi en försvarsmekanism baserad på injektion av osäkerhet i regulatorn. Därefter undersöker vi feldetektorns konfidentialitet. Med kännedom om feldetektorns tillstånd kan angriparen skapa en kraftfullare attack. Vi visar att angriparen kan få en noggrann uppskattning av detektorns tillstånd när detektorn har linjär dynamik. Den andra delen av avhandlingen behandlar feldetektorers prestanda medan de utsätts för de attacker som introducerades i första delen. Vi använder en tidigare föreslagen metrik för att jämföra prestandan av detektorer baserade på χ2-fördelningen, kumulativ summa (CUSUM), och multivariat exponentiellt viktat glidande medelvärde (MEWMA). Denna metrik beror på verkan av attacken och genomsnittlig tid mellan falska larm. Vi observerar att CUSUM- och MEWMA-detektorerna, där båda har intern dynamik, kan begränsa verkan av attacker bättre än vad den statiska χ2-detektorn kan för två olika processer. Eftersom denna metrik beror på attackens verkan, vilket vanligtvis är svårt att fastställa, föreslår vi en ny metrik. Den nya metriken beror på antalet sensorer och storleken på en invariant mängd som garanterar att attacken förblir oupptäckt. Den nya metriken leder till liknande resultat somden tidigare föreslagna metriken, men är mindre beroende av en modell av angriparen. Slutligen formulerar vi ett Stackelberg-spel för att ställa in trösklar för feldetektorn på ett kostnadsoptimalt sätt, där kostnaden beror på antalet falska larm och potentiell verkan av attacker.
Khanapure, Vishal. "Memory efficient distributed detection of node replication attacks in wireless sensor networks." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0025072.
Full textCai, Hang. "Detecting Data Manipulation Attacks on Physiological Sensor Measurements in Wearable Medical Systems." Digital WPI, 2018. https://digitalcommons.wpi.edu/etd-dissertations/502.
Full textShaon, Mohammad. "A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks." World Comp,14th International Conference on Wireless Networks, 2015, 2015. http://hdl.handle.net/1993/31981.
Full textFebruary 2017
JUNG, SANG SHIN. "Attacking and Securing Beacon-Enabled 802.15.4 Networks." Digital Archive @ GSU, 2011. http://digitalarchive.gsu.edu/cs_theses/74.
Full textMouton, Francois. "Digital forensic readiness for wireless sensor network environments." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.
Full textDissertation (MSc)--University of Pretoria, 2012.
Computer Science
unrestricted
Ben, Jaballah Wafa. "Securing wireless sensor and vehicular networks." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0013/document.
Full textWireless sensor and vehicular networks play an important role in critical military and civil applications, and pervade our daily life. However, security concerns constitute a potential stumbling block to the impeding wide deployment of sensor networks and vehicular communications. This dissertation studies communication security for Wireless Sensor Networks (WSNs), and vehicular communication. To this aim, we address four important aspects. The first study addresses broadcast authentication in WSNs. We focus on key disclosure based schemes. We demonstrate that key disclosure delay induces an authentication delay, which could lead to a memory DoS attack. We then propose two broadcastauthentication protocols for WSNs, which overcome the security vulnerability of existingsolutions. The proposed schemes guarantee the efficient management of receiver’s buffer, by employing a staggered authentication mechanism, and a Bloom filter data structure to reduce the communication overhead. We also validate our protocols under the AVISPA model checking tool, and we evaluate them with experiments under TinyOS. Our findings are that these protocols provide source authentication service while respecting the WSN constraints.The second study addresses the storage issue in WSNs, in particular the Delayed AuthenticationCompromise attack (DAC). We first demonstrate that recently proposed schemes, which also address the DAC issue are vulnerable to two kinds of attacks: switch command attack (where an adversary pretends to “switch” two messages over time), and drop command attack (where an adversary just pretends to “hide” a message sent from the broadcaster). As a countermeasure against these attacks, we propose a new solution for broadcast authentication. Our analysis shows that our solution is effective in detecting both switch command and drop command attack, and—at the same time—is more efficient (in terms of both communication and computation) than the state of the art solutions.In the third study, we address key management security in WSNs. We present novel symmetric-key-based authentication schemes which exhibit low computation and communication authentication overhead. Our schemes are built upon the integration of a reputation mechanism, a Bloom filter, and a key binary tree for the distribution and updating of the auxviii thentication keys. Our schemes are lightweight and efficient with respect to communication and energy overhead. The fourth study addresses security in vehicular communications. We focus on fast multi hop broadcast applications. We analyze the security threats of state of the art vehicular based safety applications. We demonstrate that these schemes are vulnerable to the position cheating attack, the replay broadcast message attack, and the interrupting forwarding attack. Then, we propose countermeasures for these threats. We hence propose a complete solution which is both fast and secure in broadcasting safety related messages: Fast and Secure Multi-hop Broadcast Algorithm (FS-MBA). Finally, we confirm the efficiency and feasibility of our proposals using an extensive set of simulations under NS-2 Simulator
Francillon, Aurélien. "Attacking and Protecting Constrained Embedded Systems from Control Flow Attacks." Phd thesis, Grenoble INPG, 2009. http://tel.archives-ouvertes.fr/tel-00540371.
Full textHoussain, Hilal. "Elliptic curve cryptography algorithms resistant against power analysis attacks on resource constrained devices." Thesis, Clermont-Ferrand 2, 2012. http://www.theses.fr/2012CLF22286/document.
Full textElliptic Curve Cryptosystems (ECC) have been adopted as a standardized Public Key Cryptosystems (PKC) by IEEE, ANSI, NIST, SEC and WTLS. In comparison to traditional PKC like RSA and ElGamal, ECC offer equivalent security with smaller key sizes, in less computation time, with lower power consumption, as well as memory and bandwidth savings. Therefore, ECC have become a vital technology, more popular and considered to be particularly suitable for implementation on resource constrained devices such as the Wireless Sensor Networks (WSN). Major problem with the sensor nodes in WSN as soon as it comes to cryptographic operations is their extreme constrained resources in terms of power, space, and time delay, which limit the sensor capability to handle the additional computations required by cryptographic operations. Moreover, the current ECC implementations in WSN are particularly vulnerable to Side Channel Analysis (SCA) attacks; in particularly to the Power Analysis Attacks (PAA), due to the lack of secure physical shielding, their deployment in remote regions and it is left unattended. Thus designers of ECC cryptoprocessors on WSN strive to introduce algorithms and architectures that are not only PAA resistant, but also efficient with no any extra cost in terms of power, time delay, and area. The contributions of this thesis to the domain of PAA aware elliptic curve cryptoprocessor for resource constrained devices are numerous. Firstly, we propose two robust and high efficient PAA aware elliptic curve cryptoprocessors architectures based on innovative algorithms for ECC core operation and envisioned at securing the elliptic curve cryptoprocessors against Simple Power Analysis (SPA) attacks on resource constrained devices such as the WSN. Secondly, we propose two additional architectures that are envisioned at securing the elliptic curve cryptoprocessors against Differential Power Analysis (DPA) attacks. Thirdly, a total of eight architectures which includes, in addition to the two SPA aware with the other two DPA awareproposed architectures, two more architectures derived from our DPA aware proposed once, along with two other similar PAA aware architectures. The eight proposed architectures are synthesized using Field Programmable Gate Array (FPGA) technology. Fourthly, the eight proposed architectures are analyzed and evaluated by comparing their performance results. In addition, a more advanced comparison, which is done on the cost complexity level (Area, Delay, and Power), provides a framework for the architecture designers to select the appropriate design. Our results show a significant advantage of our proposed architectures for cost complexity in comparison to the other latest proposed in the research field
Sandström, Marie. "Liveness Detection in Fingerprint Recognition Systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2397.
Full textBiometrics deals with identifying individuals with help of their biological data. Fingerprint scanning is the most common method of the biometric methods available today. The security of fingerprint scanners has however been questioned and previous studies have shown that fingerprint scanners can be fooled with artificial fingerprints, i.e. copies of real fingerprints. The fingerprint recognition systems are evolving and this study will discuss the situation of today.
Two approaches have been used to find out how good fingerprint recognition systems are in distinguishing between live fingers and artificial clones. The first approach is a literature study, while the second consists of experiments.
A literature study of liveness detection in fingerprint recognition systems has been performed. A description of different liveness detection methods is presented and discussed. Methods requiring extra hardware use temperature, pulse, blood pressure, electric resistance, etc., and methods using already existent information in the system use skin deformation, pores, perspiration, etc.
The experiments focus on making artificial fingerprints in gelatin from a latent fingerprint. Nine different systems were tested at the CeBIT trade fair in Germany and all were deceived. Three other different systems were put up against more extensive tests with three different subjects. All systems werecircumvented with all subjects'artificial fingerprints, but with varying results. The results are analyzed and discussed, partly with help of the A/R value defined in this report.
Karaaslan, Ibrahim. "Anti-sensor Network: Distortion-based Distributed Attack In Wireless Sensor Networks." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/3/12609276/index.pdf.
Full textGerbert, Oscar. "Attack on the Chaos Sensor Network Protocol." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-260480.
Full textBarb, Daniel, Bryan Freeman, Mark Jackson, Douglas Mount, and William Newcomb. "Joint Terminal Attack Controllers Sensors and Lasers Modernization." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/17456.
Full textApproved for public release, distribution unlimited
Inconsistencies exist among components of current ground targeting equipment because they were all fielded at different times and with different Concepts of Operations. This has caused an impractical design trade space resulting in unclear requirements that are inconsistent with either state of the art technology or a threat analysis of all possible combat situations. The Joint Terminal Attack Controller Sensors and Lasers Modernization capstone project was started to provide models, trade spaces, and a technology roadmap/modernization plan that will guide future development of equipment belonging to the Tactical Air Control Party suite of equipment. The process used for the project was to gather all of the requirements in one consolidated list and prioritize it based upon user representative feedback. This list, with current Science and Technology efforts, was used to provide data points corresponding to future technology improvements and determine whether or not those improvements will add value to the end user. Based upon this project it was found, somewhat surprisingly, that the most valued system characteristic is Target Location Error, followed by Weight and Target Designation Range. It was also found that both Mid Wave Infrared and Short Wave Infrared technologies are most promising compared to Long Wave Infrared.
Tan, Hailun Computer Science & Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.
Full textGujar, Surabhi Satyajit. "Detecting Electromagnetic Injection Attack on FPGAs Using In Situ Timing Sensors." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/97006.
Full textMS
Gottumukkala, Venkata Praneeth Varma. "Providing Location Privacy to Base Station in Wireless Sensor Networks." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1353100851.
Full textEngvall, Christoffer. "Security in Wireless Sensor Networks for Open Controller." Thesis, Linköpings universitet, Databas och informationsteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-91089.
Full textChen, Xiangqian. "Defense Against Node Compromise in Sensor Network Security." FIU Digital Commons, 2007. http://digitalcommons.fiu.edu/etd/7.
Full textQayoom, Mohamad. "An Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks "V-MAC"." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/704.
Full textHaberlin, Richard J. "Analysis of unattended ground sensors in theater Missile Defense Attack Operations." Thesis, Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/26369.
Full textUnattended ground sensors have a tremendous potential for improving Tactical Ballistic Missile Attack Operations. To date, however, this potential has gone unrealized primarily due to a lack of confidence in the systems and a lack of tactical doctrine for their employment. This thesis provides analyses to demonstrate the effective use of sensor technology and provides recommendations as to how they may best be employed. The probabilistic decision model reports the optimal size array for each of the candidate array locations. It also provides an optimal policy for determining the likelihood that the target is a Time Critical Target based on the number of sensors in agreement as to its identity. This policy may vary with each candidate array. Additionally, recommendations are made on the placement of the arrays within the theater of operations and their optimal configuration to maximize information gained while minimizing the likelihood of compromise. Specifics include, inter-sensor spacing, placement patterns, array locations, and off-road distance
Yildiz, Kursad. "Electronic attack and sensor fusion techniques for boot-phase defense against multiple ballistic threat missiles." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FYildiz.pdf.
Full textThesis Advisor(s): Phillip E. Pace, Murali Tummala. Includes bibliographical references (p.155-158). Also available online.
Lu, Jingyang. "A Study on False Information Injection Attack on Dynamic State Estimation in Multi-Sensor Systems." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3789.
Full textRen, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.
Full textLu, Huabo. "Sender cover traffic to counter an improved Statistical Disclosure Attack." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5040.
Full textThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science
Erdene-Ochir, Ochirkhand. "Résilience et application aux protocoles de routage dans les réseaux de capteurs." Phd thesis, INSA de Lyon, 2013. http://tel.archives-ouvertes.fr/tel-00862710.
Full textYanase, Yoshiyuki. "Development of Acoustic Emission and Gas Monitoring Methods for Nondestructive Detection of Termite Attack on Wooden Structures." Kyoto University, 2013. http://hdl.handle.net/2433/179364.
Full textLe, Moigne Yann. "Adaptive Mesh Refinement and Simulations of Unsteady Delta-Wing Aerodynamics." Doctoral thesis, KTH, Aeronautical and Vehicle Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3786.
Full textThis thesis deals with Computational Fluid Dynamics (CFD)simulations of the flow around delta wings at high angles ofattack. These triangular wings, mainly used in militaryaircraft designs, experience the formation of two vortices ontheir lee-side at large angles of attack. The simulation ofthis vortical flow by solving the Navier-Stokes equations isthe subject of this thesis. The purpose of the work is toimprove the understanding of this flow and contribute to thedesign of such a wing by developing methods that enable moreaccurate and efficient CFD simulations.
Simulations of the formation, burst and disappearance of thevortices while the angle of attack is changing are presented.The structured flow solver NSMB has been used to get thetime-dependent solutions of the flow. Both viscous and inviscidresults of a 70°-swept delta wing pitching in anoscillatory motion are reported. The creation of the dynamiclift and the hysteresis observed in the history of theaerodynamic forces are well reproduced.
The second part of the thesis is focusing on automatic meshrefinement and its influence on simulations of the delta wingleading-edge vortices. All the simulations to assess the gridquality are inviscid computations performed with theunstructured flow solver EDGE. A first study reports on theeffects of refining thewake of the delta wing. A70°-swept delta wing at a Mach number of 0.2 and an angleof attack of 27° where vortex breakdown is present abovethe wing, is used as testcase. The results show a strongdependence on the refinement, particularly the vortex breakdownposition, which leads to the conclusion that the wake should berefined at least partly. Using this information, a grid for thewing in the wind tunnel is created in order to assess theinfluence of the tunnel walls. Three sensors for automatic meshrefinement of vortical flows are presented. Two are based onflow variables (production of entropy and ratio of totalpressures) while the third one requires an eigenvalue analysisof the tensor of the velocity gradients in order to capture theposition of the vortices in the flow. These three vortexsensors are successfully used for the simulation of the same70° delta wing at an angle of attack of 20°. Acomparison of the sensors reveals the more local property ofthe third one based on the eigenvalue analysis. This lattertechnique is applied to the simulation of the wake of a deltawing at an angle of attack of 20°. The simulations on ahighly refined mesh show that the vortex sheet shed from thetrailing-edge rolls up into a vortex that interacts with theleading-edge vortex. Finally the vortex-detection technique isused to refine the grid around a Saab Aerosystems UnmannedCombat Air Vehicle (UCAV) configuration and its flight dynamicscharacteristics are investigated.
Key words:delta wing, high angle of attack, vortex,pitching, mesh refinement, UCAV, vortex sensor, tensor ofvelocity gradients.
Blackwood-Brown, Carlene G. "An Empirical Assessment of Senior Citizens’ Cybersecurity Awareness, Computer Self-Efficacy, Perceived Risk of Identity Theft, Attitude, and Motivation to Acquire Cybersecurity Skills." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1047.
Full textLapinskas, Vytautas. "Sklandytuvo atakos ir slydimo kampų matavimo metodų tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110615_175706-86724.
Full textThe thesis made the glider’s attack and slip angle measurement methods for the investigation. The first part gives an overview of measuring devices of angle of attack and slip angle: The side string, attached to the side of the canopy, vane mounted AOA sensor, Pitot-tube type sensor. The sensors are compared, describes their advantages and disadvantages compared with other sensors. The second part describes the alpha and beta angle measurement methods: measurement with the tube-type sensor, and the method without using the specific attack, slip angle sensors. The following gives an overview of factors affecting the measurement accuracy. Several tube-type sensor calibration curves are presented. The last part of thesis presents development of mathematical – dynamic model of the glider using Matlab software. The model calculates the angle of attack and slip using set conditions of flight.
Gill, Rupinder S. "Intrusion detection techniques in wireless local area networks." Queensland University of Technology, 2009. http://eprints.qut.edu.au/29351/.
Full textMakke, Ali. "Détection d'attaques dans un système WBAN de surveillance médicale à distance." Thesis, Paris 5, 2014. http://www.theses.fr/2014PA05S006/document.
Full textOne of the major challenges of the world in recent decades is the continued increase in the elderly population in developed countries. Hence the need to provide quality care to a rapidly growing population while reducing the costs of health care is becoming a strategic challenge. In this context, many researches focus on the use of wireless sensor networks in WBAN (Wireless Body Area Network) systems to facilitate and improve the quality of medical care and remote monitoring. These WBAN systems pose new technological challenges in terms of security and protection against faults and attacks. The wireless communication mode used between the sensors and the collection node accentuates these vulnerabilities. Indeed vulnerabilities in a WBAN system are divided into two main parts. The first part consists of the possible attacks on the network of medical sensors and on the wireless communications medium between the sensors and the processing unit. The second part consists of possible attacks on high-speed communications between the WBAN system and the medical server. The objective of this thesis is to meet some of the problems of detecting attacks in a WBAN system for remote medical monitoring. To achieve this goal, we propose an algorithm to detect the jamming attacks targeting the wireless communications medium between the sensors and the processing unit. In addition we propose a method of measuring divergence to detect the flooding attacks targeting the high-speed communications between the WBAN system and the medical server
Megahed, Mohamed Helmy Mostafa. "SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31154.
Full textKrauß, Christoph. "Handling Insider Attacks in Wireless Sensor Networks." Phd thesis, 2010. https://tuprints.ulb.tu-darmstadt.de/2158/1/Dissertation_ckrauss.pdf.
Full textMulpuru, Venkata M. "Detecting selective forwarding attacks in wireless sensor networks." 2008. http://digital.library.okstate.edu/etd/umi-okstate-2638.pdf.
Full textHsu, Sung-Chien, and 許嵩健. "Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/fx5895.
Full text國立中山大學
資訊管理學系研究所
104
Recently, with the development of IPv6 and Internet, wireless sensor network becomes more popular in Internet of thing. ZigBee Alliance announced ZigBee IP specification in 2013, which upgraded the protocol of wireless sensor network from IPv4 to IPv6, and solved the issue of the insufficient IP addresses. However, IPv6 wireless sensor network still faces wormhole attacks. The Wormhole attacks generate a wormhole tunnel, and cause neighbors to go through it. Which means the attackers can sniff, modify, or drop packets. There are still some limitations in detecting method of wormhole attack in researches. For example, some researches require GPS support or precise synchronized time in the system. This paper proposes wormhole detection system. Without any other hardware and system support, our solution analyst packets through RPL standard routing protocol only. We have a good detection rate, according to our experimental results.
Sheshachalam, Karthikram. "Energy consumption during attacks and countermeasures in sensor networks." 2006. http://digital.library.okstate.edu/etd/umi-okstate-1881.pdf.
Full textChang, Wen-Chung, and 張文中. "Detecting Sybil Attacks with Neighboring Information in Wireless Sensor Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/86053560474594668082.
Full text國立成功大學
電腦與通信工程研究所
95
As widely used in the military and civilians, security has become an important issue in Wireless Sensor Networks (WSNs). The Sybil attack is a notorious attack in sensor and peer-to-peer networks. In the Sybil attack, a malicious node illegitimately claims a lot of identities to other nodes and try to disturb the networks by those forged identities. Most previous solutions focus on authentication-based mechanisms which share some encryption keys and verify the identities of each other. Different from previous solutions, this thesis proposed a method which need not share any keys or keep any secret information to authenticate the node's identities. The idea is to verify the differences in neighboring nodes of each node. The mathematical analysis results showed that the mechanism performs well while the node density is high enough and the simulation results also showed that the method could identify more than 99% Sybil nodes with little false detection.
Wu, Kung-Han, and 吳恭漢. "Study on Detection of Sybil Attacks in Wireless Sensor Networks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/15845731698494670648.
Full text國立臺北教育大學
資訊科學系碩士班
104
The advent of the digital age has brought explosive development of communication technologies and mobile computing devices, such as smart phone and tablet PC, are widely used. These devices are usually embedded with multiple sensors, such as GPS and digital compass sensors. These new technologies can be used to collect data from the surrounding environment to a central controller so as to develop different applications. Therefore, security is an important issue in wireless sensor networks. Wireless sensor network mainly suffers security threats from a variety of attacks. This is because that mostly the wireless sensor devices are deployed in a non-controlled area. Furthermore, the diverse nature of wireless communication makes it vulnerable to attacks. This study focuses on the detection and analysis of Sybil attacks in wireless sensor networks. Sybil attacks were first proposed by the Microsoft researcher J. R. Douceur. A Sybil attack node will disguise its identity and transmit false information to the other nodes or the central controller. The proposed Sybil attack detection scheme is based on the analysis of the received signal strength between nodes, the traffic volume and the network topology. Usually, there will be multiple nodes with different identities in the same position if there are Sybil attacks in the wireless Sensor network. Also, a Sybil attack node will have abnormal traffics in comparison with other regular nodes. Besides, a Sybil attack node may have a different position or network identity that have been recorded in the central controller, which has the knowledge about the topology of the network. Thus, the schemes for detecting Sybil attacks are developed as follows. Assume that a Sybil attack node stays in a fixed location. The location of a node in the network can be computed by utilizing the RSSI values between nodes. If a node with multiple identities but has a fixed location, then it is considered as a Sybil attack node. Besides, the central controller can record all the traffic of all nodes in the network and derive the average traffic volume of a node. If a certain node has different traffic volume for a certain period of time, it is considered as a Sybil attack node. Furthermore, since the central controller can record and track the location of a node in the network, if a data reporting node has the same ID as some previous one but is far away from that node, then this node is considered as a Sybil attack node. The above three schemes were verified by simulation experiments. The simulation results showed that the proposed schemes can effectively detect Sybil attacks. Thus, the detrimental effects of Sybil attacks on the network performance can be reduced and the security of the wireless sensor networks can be enhanced as well.
Xu, Wenyuan Veronica. "Defending wireless networks from radio interference attacks." 2007. http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.16800.
Full textKrauß, Christoph [Verfasser]. "Handling insider attacks in wireless sensor networks / vorgelegt von Christoph Krauß." 2010. http://d-nb.info/1003545335/34.
Full textLee, Wei-Teng, and 李維騰. "A Study of Defending Compromised Nodes Attacks in Wireless Sensor Networks." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/76388365970593299702.
Full text國立中興大學
資訊管理學系所
102
Recently, Wireless Sensor Networks (WSNs) are rapidly used to many areas. A WSN is composed of a number of resource-constrained sensor nodes which are often deployed in unattended environments. Therefore, the low cost sensor nodes can be easily compromised by an intruder. An intruder randomly captures a legitimate sensor node, and collects all secret elements. Then, an intruder inserts the secret element in his malicious sensor nodes and deploys the malicious sensor nodes into the network. An intruder can use malicious nodes to eavesdrop on the communication of other sensors, or inject false data reports that make a server misjudge. In this thesis, it focuses on defending compromised nodes attacks in wireless sensor networks. We classify the defending compromised nodes attacks into three topics: (1) detecting node replication attacks, (2) deterministic sequence-number-based group rekeying scheme and (3) detecting a false data report filtering scheme in wireless sensor networks. Our purpose is to survey the previous researches of these three topics and analyze the previous researches and demonstrate contributions of the existent literatures in detail. Finally, we also mention the future work related to these three topics.
Wang, Hou-Jie, and 王厚傑. "A Countermeasure to Prevent Traffic Analysis Attacks in Wireless Sensor Networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/82551045838421510608.
Full text國立臺灣科技大學
資訊工程系
96
In a typical wireless sensor network application, the sensor nodes collect environmental data and forward it back to the base station via multi-hop communications. Therefore, the traffic load on the nodes close to the base station is relatively heavier that an adversary may identify the location of the base station and cause security breaches by analyzing the traffic. In this thesis, we create traffic decoys that also sustain higher communication traffic to mask the location of the base station. Compared with previous approaches, our method provides defenses against adversaries with the global monitoring capability, and the true location of the base station is better protected.
Chen, Yingying. "Securing wireless localization against signal strength attacks." 2007. http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.15800.
Full textRadhakrishnan, Preetha. "Enhanced routing protocol for graceful degradation in wireless sensor networks during attacks." Thesis, 2005. http://hdl.handle.net/10057/778.
Full textThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering.
"December 2005."
Radhakrishnan, Preetha Pendse Ravindra. "Enhanced routing protocol for graceful degradation in wireless sensor networks during attacks." Diss., 2005. http://il.proquest.com/products_umi/dissertations.
Full text"December 2005." Title from PDF title page (viewed on April 23, 2007). Thesis adviser: Ravi Pendse. UMI Number: AAT 1436580 Includes bibliographic references (leaves 48-50).
Govender, Servapalan. "A framework for evaluating countermeasures against sybil attacks in wireless sensor networks." Diss., 2011. http://hdl.handle.net/2263/26241.
Full textDissertation (MEng)--University of Pretoria, 2011.
Electrical, Electronic and Computer Engineering
unrestricted
Chen, Yi-Jyun, and 陳怡君. "Location-Aware Pairwise Key Predistribution Scheme for Wireless Sensor Networks Against Colluding Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/64676145675167596054.
Full text國立嘉義大學
資訊工程學系研究所
95
Wireless sensor networks (WSNs) are composed of sensor nodes which have limited computations and communication capabilities. Sensor nodes can collect information needed, and transmit data to the base station through Internet. Then the base station analyzes the sensing information. The first application of wireless sensor networks is for military purpose, that is, sensor nodes are deployed in hostile environment and collect information needed. The applications of wireless sensor networks are currently extended popularly so that the security issues are more and more important. Pairwise key establishment is a necessary security service in wireless sensor networks for secure communication between any two nodes. Due to the limited resources of the sensor nodes, traditional security protocols such as public key cryptography and centralized key distribution are not suitable for wireless sensor networks. Recently, many security protocols of wireless sensor networks have been proposed. In this paper, we presents a novel key predistribution scheme for establishing pairwise key between nodes and efficiently rekeying the compromised keys to revoke the compromised nodes. Compared with the previous schemes, our scheme has a high probability to establish the pairwise keys whatever the nodes are placed in the same group or in the neighboring groups. A powerful procedure for the tolerance of node capture, and an efficient strategy to prevent the compromised nodes from colluding attacks are also discussed in this thesis.