While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are utilized have sensitive data. Therefore, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if measures are not taken to deal with this event. There have been many approaches researched to tackle the issue. In this thesis, an anomaly-based intrusion detection protocol is developed to detect compromised nodes in wireless sensor networks. The proposed protocol is implemented after the sensors are deployed into the environment in which they will be used. They will start to learn the normal behavior of each of their neighbors with whom they communicate...
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless s...
Safety critical, Internet of Things (IoT) and space-based applications have recently begun to adopt ...
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. Th...
While wireless sensor networks are proving to be a versatile tool, many of the applications in which...
Wireless Sensor Networks (WSNs) have been applied to a wide range of application areas, including ba...
Wireless sensor networks are an emerging field where a large number of cheap sensors are dispersed o...
Wireless sensor networks are a promising technology for many real-world applications such as critica...
The objective of this thesis is to detect malfunctioning sensors in wireless sensor networks. The ab...
There are many mechanisms that can cause inadequate or unreliable information in sensor networks. A ...
This dissertation addresses the problem of distributed anomaly detection in Wireless Sensor Networks...
With the rise of IOT devices and the systems connected to the internet, there was, accordingly, an e...
In this paper, we investigate security issues and challenges facing researchers in wireless sensor n...
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, ...
The primary function of wireless sensor networks is to gather sensor data from the monitored area. D...
Wireless sensor networks have become a mature technology. They are increasingly being used in differ...
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless s...
Safety critical, Internet of Things (IoT) and space-based applications have recently begun to adopt ...
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. Th...
While wireless sensor networks are proving to be a versatile tool, many of the applications in which...
Wireless Sensor Networks (WSNs) have been applied to a wide range of application areas, including ba...
Wireless sensor networks are an emerging field where a large number of cheap sensors are dispersed o...
Wireless sensor networks are a promising technology for many real-world applications such as critica...
The objective of this thesis is to detect malfunctioning sensors in wireless sensor networks. The ab...
There are many mechanisms that can cause inadequate or unreliable information in sensor networks. A ...
This dissertation addresses the problem of distributed anomaly detection in Wireless Sensor Networks...
With the rise of IOT devices and the systems connected to the internet, there was, accordingly, an e...
In this paper, we investigate security issues and challenges facing researchers in wireless sensor n...
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, ...
The primary function of wireless sensor networks is to gather sensor data from the monitored area. D...
Wireless sensor networks have become a mature technology. They are increasingly being used in differ...
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless s...
Safety critical, Internet of Things (IoT) and space-based applications have recently begun to adopt ...
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. Th...