Malicious relay detection using sentinels: A stochastic geometry framework

U Tefek, A Tandon, TJ Lim - Journal of Communications and …, 2020 - ieeexplore.ieee.org
Next generation wireless networks are under high risk of security attacks due to increased
connectivity and information sharing among peer nodes. Some of the nodes could …

On security and reliability using cooperative transmissions in sensor networks

A Aksu, P Krishnamurthy, D Tipper… - Mobile Networks and …, 2012 - Springer
Cooperative transmissions have received recent attention and research papers have
demonstrated their benefits for wireless networks. Such benefits include improving the …

Fast jamming detection in sensor networks

K Siddhabathula, Q Dong, D Liu… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) are vulnerable to jamming attacks where an adversary
injects strong noises to interfere with the normal transmission. It is crucial to detect such …

On the use of distributed relays to increase base station anonymity in wireless sensor networks

JR Ward, M Younis - MILCOM 2012-2012 IEEE Military …, 2012 - ieeexplore.ieee.org
In recent years, Wireless Sensor Networks (WSNs) have become valuable assets to both the
commercial and military communities with applications ranging from industrial control on a …

Exploiting channel-aware reputation system against selective forwarding attacks in WSNs

J Ren, Y Zhang, K Zhang… - 2014 IEEE Global …, 2014 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are vulnerable to selective forwarding attacks that
selectively drop a subset of the forwarding packets to degrade network performances. Due …

An authentication scheme for locating compromised sensor nodes in WSNs

Y Zhang, J Yang, W Li, L Wang, L Jin - Journal of Network and Computer …, 2010 - Elsevier
Wireless sensor networks have recently emerged as a promising computing model for many
civilian and military applications. Sensor nodes in such a network are subject to varying …

Harnessing node multiplicity for detecting and mitigating false data in wireless relay networks

X Liu, SW Kim - IEEE Transactions on Information Forensics …, 2020 - ieeexplore.ieee.org
We present the physical-layer maximum a posteriori (MAP) test for detecting false data in
multiple-source wireless relay networks. The MAP test, which minimizes the average …

[PDF][PDF] Cross verification-based detection of the evil ring attack in wireless sensor networks

W Shi, M Barbeau, JP Corriveau - World of Wireless Mobile and …, 2010 - cs.carleton.ca
In ad hoc networks and wireless sensor networks, several routing algorithms rely on the
knowledge by the network nodes of their own geographic location and those of others. For …

[PDF][PDF] Detecting Sinkhole Attacks by Observing the Quality of Link in Wireless Sensor Networks.

YB Reddy - ICWN, 2009 - academia.edu
A sinkhole attack is one of the severe attacks in wireless sensor networks. This attack
compromises nodes of a particular are, and diverts the traffic from the base station into the …

Efficient cooperative detection for wireless sentinel networks

Q Shi, C Comaniciu - 2010 44th Annual Conference on …, 2010 - ieeexplore.ieee.org
In this paper, we propose an energy efficient cooperative detection scheme for wireless
sentinel networks monitoring for surreptitious wireless communications. Our solution exploits …