A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
Policy-driven physical attacks in sensor networks: modeling and measurement
2006
IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006.
In this paper, we present Policy-driven Physical Attacks, where the bias between the twin objectives of the attacker (rapidly destroying sensors, and preserving the deployment field) is modeled as a policy ...
In policy-driven physical attacks, the attacker walks through the sensor network deployment field using signal detecting equipment to locate active sensors. ...
In Section II, we first discuss the classification of physical attacks in sensor networks and related sensor network features. We present our policy-driven physical attack model in Section III. ...
doi:10.1109/wcnc.2006.1683549
dblp:conf/wcnc/WangCGYX06
fatcat:phnhhprxorehrd2q7zcxhetk3u
Edge Intelligence in Smart Grids: A Survey on Architectures, Offloading Models, Cyber Security Measures, and Challenges
2022
Journal of Sensor and Actuator Networks
Additionally, we divided the primary articles into two categories based on the number of users included in the model, either a single user or a multiple user instance. ...
Finally, we review the cybersecurity threats with edge computing and the methods used to mitigate them in SGs. ...
Physical Damage Physical damage is one of the most often seen attacks in edge computing as a result of intruder manipulation. ...
doi:10.3390/jsan11030047
fatcat:rgsocn6zj5ewbms5dqrgz25ewq
Cybersecurity in networking
2019
Annales des télécommunications
Publisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. ...
Last, the guest editors would like to express their thanks to all the authors for submitting quality articles and the reviewers for helping in the selection of papers and improving the accepted papers. ...
Acknowledgments The guest editors would like to express their deep appreciation to the editor-in-chief, Prof. Guy Pujolle, for giving them the opportunity to publish this special issue. ...
doi:10.1007/s12243-019-00706-w
fatcat:ba3bfuqyhnegdpzceiwym3dtim
Resilient networking in wireless sensor networks
[article]
2010
arXiv
pre-print
We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. ...
This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. ...
The following sections summarize existing attacks and defensive measures following the layered network architecture of the OSI model. ...
arXiv:1003.5104v1
fatcat:nwpp45awtnbz7kfvrp6mkeoqi4
Wireless Sensor Networks for Healthcare
2010
Proceedings of the IEEE
Driven by the confluence between the need to collect data about people's physical, physiological, psychological, cognitive, and behavioral processes in spaces ranging from personal to urban and the recent ...
In this review we present some representative applications in the healthcare domain and describe the challenges they introduce to wireless sensor networks due to the required level of trustworthiness and ...
INTRODUCTION Driven by technology advances in low-power networked systems and medical sensors, we have witnessed in recent years the emergence of wireless sensor networks (WSNs) in healthcare. ...
doi:10.1109/jproc.2010.2065210
fatcat:anmlpz2ysngexnmipkv3efvk6u
Construction and Research on Cloud-edge Collaborative Power Measurement and Security Model
2024
EAI Endorsed Transactions on Energy Web
We are conducting research to develop a specialized cloud-edge power measurement and security model. ...
Future research may focus on both expanding the model's use to an array of larger, more complex networks, as well as the inclusion of AI driven predictive analytics to amplify accuracy of power management ...
Direct metering and model-based estimation are two power measurement methods tailored to these contexts. Direct metering uses physical sensors to measure the consumption of computing power. ...
doi:10.4108/ew.5522
fatcat:34yae4cyirbg7b47aiqjjhrdja
Cyber-physical architecture assisted by programmable networking
2018
Internet Technology Letters
Cyber-physical technologies are prone to attacks, in addition to faults and failures. ...
The issue of protecting cyber-physical systems should be tackled by jointly addressing security at both cyber and physical domains, in order to promptly detect and mitigate cyber-physical threats. ...
Acknowledgment The research in this paper has received partial funding from the Cyber-CNI Chair of the Institut Mines-Telecom (http://chaire-cyber-cni.fr/). ...
doi:10.1002/itl2.44
dblp:journals/itl/Rubio-HernanSCG18
fatcat:fvnhjkquljdynaofgypobldrjy
Cyber-Physical Architecture Assisted by Programmable Networking
[article]
2018
arXiv
pre-print
Cyber-physical technologies are prone to attacks, in addition to faults and failures. ...
The issue of protecting cyber-physical systems should be tackled by jointly addressing security at both cyber and physical domains, in order to promptly detect and mitigate cyber-physical threats. ...
Acknowledgment The research in this paper has received partial funding from the Cyber-CNI Chair of the Institut Mines-Telecom (http://chaire-cyber-cni.fr/). ...
arXiv:1802.02360v1
fatcat:mrw6elmu7ff7pgfahdanygnefm
Security Issues of Low Power Wide Area Networks in the Context of LoRa Networks
[article]
2020
arXiv
pre-print
But it also implies long in-the-air transmission time, which makes the transmitted packets vulnerable to different kinds of malicious attacks, especially in the physical and the link layer. ...
Our survey reveals that there is an urgent need for secure and uninterrupted communication between an end-device and the gateway, especially when the threat models are unknown in advance. ...
type
Affected layer Counter-
measure
Techniques
Remark
Jamming attack
Physical layer
Collision attack
MAC layer
Pro-active
measure
Different frequency hopping
(FH) and spread spectrum ...
arXiv:2006.16554v1
fatcat:az7wtxeujzhzhelsxvdih5suki
2020 Index IEEE Transactions on Control of Network Systems Vol. 7
2020
IEEE Transactions on Control of Network Systems
., +, TCNS March 2020 446-457 Measurement Model Reduction Based Approximation of the Output Controllability Gramian in Large-Scale Networks. ...
., +, TCNS Dec. 2020 1929-1939
Biological system modeling
Behavioral and Game-Theoretic Security Investments in Interdependent
Systems Modeled by Attack Graphs. ...
doi:10.1109/tcns.2020.3048651
fatcat:ydlonetqinfcpaxiy4itp7tsw4
A lightweight policy system for body sensor networks
2009
IEEE Transactions on Network and Service Management
Body sensor networks (BSNs) for healthcare have more stringent security and context adaptation requirements than required in large-scale sensor networks for environment monitoring. ...
In addition, a policy-driven approach enables finegrained access control through specifying authorization policies. ...
Attack Model Body sensor networks make use of short range wireless communication and are vulnerable to various attacks. The paper considers the following attacks. Eavesdropping. ...
doi:10.1109/tnsm.2009.03.090301
fatcat:nmcnwm2zqvfyrm6jireyjzrbbu
Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model
2013
International Journal of Computer Network and Information Security
Finally, our proposed security solutions are tested with the established models of deception and DOS attacks. ...
In this brief, we review the existing literature on security issues of NCSs and propose some security solutions for the DC motor networked control system. ...
Attacks to NCSs can be divided into two categories: physical attacks against the actuators, sensors or other physical devices; cyber attacks implemented through the communication network. ...
doi:10.5815/ijcnis.2014.01.10
fatcat:k2ni4cinnrh25nk5ugy4kuaotu
AI'S Contribution to Ubiquitous Systems and Pervasive Networks Security – Reinforcement Learning vs Recurrent Networks
2021
Journal of Ubiquitous Systems and Pervasive Networks
In this paper, a systematic review of this research was performed in regard to various attacks and an analysis of the trends and future fields of interest for the RL and recurrent network-based research ...
in network security was complete. ...
by the RL-based IDS (Fig. 6 ) According to [30] , adversarial attacks are also effective when targeting neural network policies in RL and have exposed a significant security vulnerability in ML-models ...
doi:10.5383/juspn.15.02.001
fatcat:tcfmazejvngihlmlqbt3gop72a
Security software engineering in wireless sensor networks
2008
Progress in Informatics
It is in general difficult to achieve and becomes particularly acute in wireless sensor networks, owing to the stringent limitations in communication and computational power. ...
The analysis of current work covers general security issues of wireless sensor network research and discusses the present achievements for engineering security with regards to earlier surveys in this domain ...
Other approaches achieve similar goals with physical measurements [50] . ...
doi:10.2201/niipi.2008.5.6
fatcat:tjr53svkpbh5rjhnwkoqahpscy
Optimal Adaptive Antijamming in Wireless Sensor Networks
2012
International Journal of Distributed Sensor Networks
By comprehensive simulation experiments, we demonstrate that a sensor network using the derived antijamming strategy can well defend from radio jamming attacks and in the meanwhile retain high energy efficiency ...
Attacked by jamming signals, a sensor network may experience corrupted packets and low network throughput. A number of defense techniques have been proposed. ...
A good survey for radio jamming attacks and counter measures against radio jamming in sensor networks can be found in [6] . 2.1. Jamming Attacks. ...
doi:10.1155/2012/485345
fatcat:iyyquywlaff33addimavooxkke
« Previous
Showing results 1 — 15 out of 13,561 results