Malicious Impact Mitigation by Index-Modulation for Decisions Gathering in Wireless Sensor Networks

R Alslamat, A Alhasanat… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
In target detection applications, Wireless Sensor Networks (WSNs) report binary decisions
about the absence/presence of a target to a Sink Node (SN) in order to make a global …

A secure optimum distributed detection scheme in under-attack wireless sensor networks

E Nurellari, D McLernon… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We address the problem of centralized detection of a binary event in the presence of fraction
falsifiable sensor nodes (SNs)(ie, controlled by an attacker) for a bandwidth-constrained …

A quantitative model for dynamic security analysis of wireless sensor networks

A Ramos, B Aquino, M Lazar… - … 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
The main purpose of wireless sensor networks (WSNs) is to gather physical data from a
target region and make them available for interested users. However, the unique …

Data centric approach to analyzing security threats in underwater sensor networks

R Martin, S Rajasekaran - OCEANS 2016 MTS/IEEE Monterey, 2016 - ieeexplore.ieee.org
The concept of securing data in Underwater Sensor Networks (UWSN) is an ongoing conflict
due to the many challenges faced in this harsh environment. Due to the restriction of energy …

Intrusion detection system in wireless sensor networks-a comprehensive survey

Y Farooq, H Beenish, M Fahad - 2019 Second International …, 2019 - ieeexplore.ieee.org
WSN is a large-scale ad hoc network with the property of adequate availability, including the
all scopes of communication applications, like health care, home automation, remote …

Air dominance in sensor networks: Guarding sensor motes using selective interference

M Wilhelm, I Martinovic, JB Schmitt… - arXiv preprint arXiv …, 2013 - arxiv.org
Securing wireless sensor networks (WSNs) is a hard problem. In particular, network access
control is notoriously difficult to achieve due to the inherent broadcast characteristics of …

SenseVault: A three-tier framework for securing mobile underwater sensor networks

M Xu, L Liu - IEEE Transactions on Mobile Computing, 2018 - ieeexplore.ieee.org
The unique characteristics of underwater channels, such as the mobility of sensor nodes,
require robust and efficient security mechanisms for secure and efficient data collection in …

Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey

P Sinha, VK Jha, AK Rai… - … Conference on Signal …, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) security is a topic of great importance because of
advancement of many security sensitive applications in diverse fields involving WSNs …

Mpbsd: a moving target defense approach for base station security in wireless sensor networks

T Chin, K Xiong - Wireless Algorithms, Systems, and Applications: 11th …, 2016 - Springer
This paper addresses one major concern on how to secure the location information of a
base station in a compromised Wireless Sensor Network (WSN). In this concern, disrupting …

Intrusion detection system (IDS) for security enhancement in wireless sensing applications

B Bhushan - … and Communication Engineering: Proceedings of the …, 2022 - Springer
Intrusion detection has been defined as the system to identify the anomalous, incorrect, or
inappropriate moving attackers. Moreover, intrusion detection system (IDS) when used …