Detecting node replication attacks in wireless sensor networks: a survey

WT Zhu, J Zhou, RH Deng, F Bao - Journal of Network and Computer …, 2012 - Elsevier
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-
constrained sensor nodes, but is often deployed in unattended and harsh environments to …

Secure control: Towards survivable cyber-physical systems

AA Cardenas, S Amin, S Sastry - 2008 The 28th International …, 2008 - ieeexplore.ieee.org
In this position paper we investigate the security of cyber-physical systems. We (1) identify
and define the problem of secure control,(2) investigate the defenses that information …

[PDF][PDF] Challenges for securing cyber physical systems

A Cardenas, S Amin, B Sinopoli, A Giani… - Workshop on future …, 2009 - Citeseer
We discuss three key challenges for securing cyberphysical systems:(1) understanding the
threats, and possible consequences of attacks,(2) identifying the unique properties of cyber …

Practical overview of security issues in wireless sensor network applications

H Radhappa, L Pan, J Xi Zheng… - International journal of …, 2018 - Taylor & Francis
Wireless sensor networks are widely used in applications to monitor and communicate data.
Even though the wireless sensor networks have been broadly used in critical applications …

Exploiting local and global patch rarities for saliency detection

A Borji, L Itti - 2012 IEEE conference on computer vision and …, 2012 - ieeexplore.ieee.org
We introduce a saliency model based on two key ideas. The first one is considering local
and global image patch rarities as two complementary processes. The second one is based …

On data-centric misbehavior detection in VANETs

S Ruj, MA Cavenaghi, Z Huang… - 2011 IEEE Vehicular …, 2011 - ieeexplore.ieee.org
Detecting misbehavior (such as transmissions of false information) in vehicular ad hoc
networks (VANETs) is a very important problem with wide range of implications, including …

ReTrust: Attack-resistant and lightweight trust management for medical sensor networks

D He, C Chen, S Chan, J Bu… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users
during their everyday lives, at health sites, without restricting their freedom. Establishing trust …

Distributed detection of clone attacks in wireless sensor networks

M Conti, R Di Pietro, L Mancini… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an
adversary can physically capture some of the nodes, first can reprogram, and then, can …

Survey of trust models in different network domains

M Momani, S Challa - arXiv preprint arXiv:1010.0168, 2010 - arxiv.org
This paper introduces the security and trust concepts in wireless sensor networks and
explains the difference between them, stating that even though both terms are used …

Exploring inherent sensor redundancy for automotive anomaly detection

T He, L Zhang, F Kong, A Salekin - 2020 57th ACM/IEEE …, 2020 - ieeexplore.ieee.org
The increasing autonomy and connectivity have been transitioning automobiles to complex
and open architectures that are vulnerable to malicious attacks beyond conventional cyber …