Sensor networks generate large amounts of geographically-distributed data. The conventional approach to exploit this data is to first gather it in a special node that then performs processing and inference. However, what happens if this node is destroyed, or even worst, if it is hijacked? To explore this problem, in this work we consider a smart attacker who can take control of critical nodes within the network and use them to inject false information. In order to face this critical security thread, we propose a novel scheme that enables data aggregation and decision-making over networks based on social learning, where the sensor nodes act resembling how agents make decisions in social networks. Our results suggest that social learning enab...
Comprised of a large number of low-cost, low-power, mobile and miniature sensors, wireless sensor ne...
In this dissertation, we consider the problem of collaborating a network of nodes to accomplish an o...
In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. How...
Background Internet of Things (IoT) suffers from vulnerable sensor nodes, which are likely to endure...
With respect to security, sensor networks have a number of considerations that separate them from tr...
Building sensor networks poses challenges of secure routing, node authentication, data integrity, da...
This paper investigates the loss of sensing fidelity in a wireless sensor network resulting from a p...
Abstract A sensor network is a network comprised of many small, wireless, resource-limited nodes tha...
Quantifying Eavesdropping Vulnerability in Sensor Networks With respect to security, sensor networks...
A sensor network is a network comprised of many small, wireless, resource-limited nodes that sense d...
Distributed detection in wireless sensor networks in the presence of one or more classes of misbehav...
Wireless sensor networks are a promising technology for many real-world applications such as critica...
We propose a novel framework to detect false data injections in a low-density sensor environment wit...
The fundamental objective of sensor networks underpinning a variety of applications is the collectio...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
Comprised of a large number of low-cost, low-power, mobile and miniature sensors, wireless sensor ne...
In this dissertation, we consider the problem of collaborating a network of nodes to accomplish an o...
In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. How...
Background Internet of Things (IoT) suffers from vulnerable sensor nodes, which are likely to endure...
With respect to security, sensor networks have a number of considerations that separate them from tr...
Building sensor networks poses challenges of secure routing, node authentication, data integrity, da...
This paper investigates the loss of sensing fidelity in a wireless sensor network resulting from a p...
Abstract A sensor network is a network comprised of many small, wireless, resource-limited nodes tha...
Quantifying Eavesdropping Vulnerability in Sensor Networks With respect to security, sensor networks...
A sensor network is a network comprised of many small, wireless, resource-limited nodes that sense d...
Distributed detection in wireless sensor networks in the presence of one or more classes of misbehav...
Wireless sensor networks are a promising technology for many real-world applications such as critica...
We propose a novel framework to detect false data injections in a low-density sensor environment wit...
The fundamental objective of sensor networks underpinning a variety of applications is the collectio...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
Comprised of a large number of low-cost, low-power, mobile and miniature sensors, wireless sensor ne...
In this dissertation, we consider the problem of collaborating a network of nodes to accomplish an o...
In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. How...