Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








13,561 Hits in 6.5 sec

Policy-driven physical attacks in sensor networks: modeling and measurement

Xun Wang, S. Chellappan, Wenjun Gu, Wei Yu, Dong Xuan
2006 IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006.  
In this paper, we present Policy-driven Physical Attacks, where the bias between the twin objectives of the attacker (rapidly destroying sensors, and preserving the deployment field) is modeled as a policy  ...  In policy-driven physical attacks, the attacker walks through the sensor network deployment field using signal detecting equipment to locate active sensors.  ...  In Section II, we first discuss the classification of physical attacks in sensor networks and related sensor network features. We present our policy-driven physical attack model in Section III.  ... 
doi:10.1109/wcnc.2006.1683549 dblp:conf/wcnc/WangCGYX06 fatcat:phnhhprxorehrd2q7zcxhetk3u

Edge Intelligence in Smart Grids: A Survey on Architectures, Offloading Models, Cyber Security Measures, and Challenges

Daisy Nkele Molokomme, Adeiza James Onumanyi, Adnan M. Abu-Mahfouz
2022 Journal of Sensor and Actuator Networks  
Additionally, we divided the primary articles into two categories based on the number of users included in the model, either a single user or a multiple user instance.  ...  Finally, we review the cybersecurity threats with edge computing and the methods used to mitigate them in SGs.  ...  Physical Damage Physical damage is one of the most often seen attacks in edge computing as a result of intruder manipulation.  ... 
doi:10.3390/jsan11030047 fatcat:rgsocn6zj5ewbms5dqrgz25ewq

Cybersecurity in networking

Rida Khatoun, Diogo Menezes Ferrazani Mattos, Otto Carlos Muniz Bandeira Duarte
2019 Annales des télécommunications  
Publisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.  ...  Last, the guest editors would like to express their thanks to all the authors for submitting quality articles and the reviewers for helping in the selection of papers and improving the accepted papers.  ...  Acknowledgments The guest editors would like to express their deep appreciation to the editor-in-chief, Prof. Guy Pujolle, for giving them the opportunity to publish this special issue.  ... 
doi:10.1007/s12243-019-00706-w fatcat:ba3bfuqyhnegdpzceiwym3dtim

Resilient networking in wireless sensor networks [article]

Ochirkhand Erdene-Ochir (CITI Insa Lyon / INRIA Grenoble Rhône-Alpes), Marine Minier (CITI Insa Lyon / INRIA Grenoble Rhône-Alpes), Fabrice Valois (CITI Insa Lyon / INRIA Grenoble Rhône-Alpes), Apostolos Kountouris
2010 arXiv   pre-print
We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures.  ...  This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature.  ...  The following sections summarize existing attacks and defensive measures following the layered network architecture of the OSI model.  ... 
arXiv:1003.5104v1 fatcat:nwpp45awtnbz7kfvrp6mkeoqi4

Wireless Sensor Networks for Healthcare

JeongGil Ko, Chenyang Lu, Mani B. Srivastava, John A. Stankovic, Andreas Terzis, Matt Welsh
2010 Proceedings of the IEEE  
Driven by the confluence between the need to collect data about people's physical, physiological, psychological, cognitive, and behavioral processes in spaces ranging from personal to urban and the recent  ...  In this review we present some representative applications in the healthcare domain and describe the challenges they introduce to wireless sensor networks due to the required level of trustworthiness and  ...  INTRODUCTION Driven by technology advances in low-power networked systems and medical sensors, we have witnessed in recent years the emergence of wireless sensor networks (WSNs) in healthcare.  ... 
doi:10.1109/jproc.2010.2065210 fatcat:anmlpz2ysngexnmipkv3efvk6u

Construction and Research on Cloud-edge Collaborative Power Measurement and Security Model

Jiajia Huang, Ying Sun, Xiao Jiang, Youpeng Huang, DongXu Zhou
2024 EAI Endorsed Transactions on Energy Web  
We are conducting research to develop a specialized cloud-edge power measurement and security model.  ...  Future research may focus on both expanding the model's use to an array of larger, more complex networks, as well as the inclusion of AI driven predictive analytics to amplify accuracy of power management  ...  Direct metering and model-based estimation are two power measurement methods tailored to these contexts. Direct metering uses physical sensors to measure the consumption of computing power.  ... 
doi:10.4108/ew.5522 fatcat:34yae4cyirbg7b47aiqjjhrdja

Cyber-physical architecture assisted by programmable networking

Jose Rubio-Hernan, Rishikesh Sahay, Luca De Cicco, Joaquin Garcia-Alfaro
2018 Internet Technology Letters  
Cyber-physical technologies are prone to attacks, in addition to faults and failures.  ...  The issue of protecting cyber-physical systems should be tackled by jointly addressing security at both cyber and physical domains, in order to promptly detect and mitigate cyber-physical threats.  ...  Acknowledgment The research in this paper has received partial funding from the Cyber-CNI Chair of the Institut Mines-Telecom (http://chaire-cyber-cni.fr/).  ... 
doi:10.1002/itl2.44 dblp:journals/itl/Rubio-HernanSCG18 fatcat:fvnhjkquljdynaofgypobldrjy

Cyber-Physical Architecture Assisted by Programmable Networking [article]

Jose Rubio-Hernan, Rishikesh Sahay, Luca De Cicco, Joaquin Garcia-Alfaro
2018 arXiv   pre-print
Cyber-physical technologies are prone to attacks, in addition to faults and failures.  ...  The issue of protecting cyber-physical systems should be tackled by jointly addressing security at both cyber and physical domains, in order to promptly detect and mitigate cyber-physical threats.  ...  Acknowledgment The research in this paper has received partial funding from the Cyber-CNI Chair of the Institut Mines-Telecom (http://chaire-cyber-cni.fr/).  ... 
arXiv:1802.02360v1 fatcat:mrw6elmu7ff7pgfahdanygnefm

Security Issues of Low Power Wide Area Networks in the Context of LoRa Networks [article]

Debraj Basu, Tianbo Gu, Prasant Mohapatra
2020 arXiv   pre-print
But it also implies long in-the-air transmission time, which makes the transmitted packets vulnerable to different kinds of malicious attacks, especially in the physical and the link layer.  ...  Our survey reveals that there is an urgent need for secure and uninterrupted communication between an end-device and the gateway, especially when the threat models are unknown in advance.  ...  type Affected layer Counter- measure Techniques Remark Jamming attack Physical layer Collision attack MAC layer Pro-active measure Different frequency hopping (FH) and spread spectrum  ... 
arXiv:2006.16554v1 fatcat:az7wtxeujzhzhelsxvdih5suki

2020 Index IEEE Transactions on Control of Network Systems Vol. 7

2020 IEEE Transactions on Control of Network Systems  
., +, TCNS March 2020 446-457 Measurement Model Reduction Based Approximation of the Output Controllability Gramian in Large-Scale Networks.  ...  ., +, TCNS Dec. 2020 1929-1939 Biological system modeling Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs.  ... 
doi:10.1109/tcns.2020.3048651 fatcat:ydlonetqinfcpaxiy4itp7tsw4

A lightweight policy system for body sensor networks

Yanmin Zhu, Sye Keoh, Morris Sloman, Emil Lupu
2009 IEEE Transactions on Network and Service Management  
Body sensor networks (BSNs) for healthcare have more stringent security and context adaptation requirements than required in large-scale sensor networks for environment monitoring.  ...  In addition, a policy-driven approach enables finegrained access control through specifying authorization policies.  ...  Attack Model Body sensor networks make use of short range wireless communication and are vulnerable to various attacks. The paper considers the following attacks. Eavesdropping.  ... 
doi:10.1109/tnsm.2009.03.090301 fatcat:nmcnwm2zqvfyrm6jireyjzrbbu

Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model

Liying Zhang, Lun Xie, Weize Li, Zhiliang Wang
2013 International Journal of Computer Network and Information Security  
Finally, our proposed security solutions are tested with the established models of deception and DOS attacks.  ...  In this brief, we review the existing literature on security issues of NCSs and propose some security solutions for the DC motor networked control system.  ...  Attacks to NCSs can be divided into two categories: physical attacks against the actuators, sensors or other physical devices; cyber attacks implemented through the communication network.  ... 
doi:10.5815/ijcnis.2014.01.10 fatcat:k2ni4cinnrh25nk5ugy4kuaotu

AI'S Contribution to Ubiquitous Systems and Pervasive Networks Security – Reinforcement Learning vs Recurrent Networks

Christophe Feltus
2021 Journal of Ubiquitous Systems and Pervasive Networks  
In this paper, a systematic review of this research was performed in regard to various attacks and an analysis of the trends and future fields of interest for the RL and recurrent network-based research  ...  in network security was complete.  ...  by the RL-based IDS (Fig. 6 ) According to [30] , adversarial attacks are also effective when targeting neural network policies in RL and have exposed a significant security vulnerability in ML-models  ... 
doi:10.5383/juspn.15.02.001 fatcat:tcfmazejvngihlmlqbt3gop72a

Security software engineering in wireless sensor networks

Eric PLATON, Yuichi SEI
2008 Progress in Informatics  
It is in general difficult to achieve and becomes particularly acute in wireless sensor networks, owing to the stringent limitations in communication and computational power.  ...  The analysis of current work covers general security issues of wireless sensor network research and discusses the present achievements for engineering security with regards to earlier surveys in this domain  ...  Other approaches achieve similar goals with physical measurements [50] .  ... 
doi:10.2201/niipi.2008.5.6 fatcat:tjr53svkpbh5rjhnwkoqahpscy

Optimal Adaptive Antijamming in Wireless Sensor Networks

Yanmin Zhu, Xiangpeng Li, Bo Li
2012 International Journal of Distributed Sensor Networks  
By comprehensive simulation experiments, we demonstrate that a sensor network using the derived antijamming strategy can well defend from radio jamming attacks and in the meanwhile retain high energy efficiency  ...  Attacked by jamming signals, a sensor network may experience corrupted packets and low network throughput. A number of defense techniques have been proposed.  ...  A good survey for radio jamming attacks and counter measures against radio jamming in sensor networks can be found in [6] . 2.1. Jamming Attacks.  ... 
doi:10.1155/2012/485345 fatcat:iyyquywlaff33addimavooxkke
« Previous Showing results 1 — 15 out of 13,561 results