A novel intrusion detection framework for wireless sensor networks

AH Farooqi, FA Khan, J Wang, S Lee - Personal and ubiquitous computing, 2013 - Springer
Vehicle cloud is a new idea that uses the benefits of wireless sensor networks (WSNs) and
the concept of cloud computing to provide better services to the community. It is important to …

Accelerating signature-based broadcast authentication for wireless sensor networks

X Fan, G Gong - Ad Hoc Networks, 2012 - Elsevier
In wireless sensor networks (WSNs), broadcast authentication is a crucial security
mechanism that allows a multitude of legitimate users to join in and disseminate messages …

LARK: a lightweight authenticated rekeying scheme for clustered wireless sensor networks

G Dini, IM Savino - ACM Transactions on Embedded Computing …, 2011 - dl.acm.org
Group communication has proven a powerful paradigm for designing applications and
services in Wireless Sensor Networks (WSNs). Given the tight interaction between WSNs …

[图书][B] Secure wireless sensor networks

M Conti - 2015 - Springer
Recent technology progress, particularly in the areas of computer networks and hardware
miniaturization, allowed the emergence of a set of novel computing and application …

Sensor data security level estimation scheme for wireless sensor networks

A Ramos, RH Filho - Sensors, 2015 - mdpi.com
Due to their increasing dissemination, wireless sensor networks (WSNs) have become the
target of more and more sophisticated attacks, even capable of circumventing both attack …

Detecting node replication attacks in mobile sensor networks: theory and approaches

WT Zhu, J Zhou, RH Deng, F Bao - Security and …, 2012 - Wiley Online Library
ABSTRACT A wireless sensor network composed of a number of sensor nodes is often
deployed in unattended and harsh environments to perform various monitoring tasks. Due to …

A multiplayer game model to detect insiders in wireless sensor networks

I Kantzavelou, L Maglaras, PF Tzikopoulos… - PeerJ Computer …, 2022 - peerj.com
Insiders might have incentives and objectives opposed to those of the belonging
organization. It is hard to detect them because of their privileges that partially protect them. In …

Towards improving data validity of cyber-physical systems through path redundancy

Z Zheng, ALN Reddy - Proceedings of the 3rd ACM Workshop on Cyber …, 2017 - dl.acm.org
Cyber-physical systems have shown to be susceptible to cyber-attacks. Incidents such as
Stuxnet Attack and Ukraine power outage have shown that attackers are capable of …

Bayesian methods for modelling and management of trust in wireless sensor networks

MM Momani - 2008 - opus.lib.uts.edu.au
Security and trust are two interdependent concepts and are often used interchangeably
when defining a secure wireless sensor network (WSN) system. However, security is …

An active detection of compromised nodes based on en-route trap in wireless sensor network

JT Wang, ZX Liu - International Journal of Distributed Sensor …, 2021 - journals.sagepub.com
With the development and wide use of wireless sensor network, security arises as an
essential issue since sensors with restrict resources are deployed in wild areas in an …