A malicious insider in a sensor network may sabotage the network at any level of operation. While most prior work on network-layer security has focused on providing control plane integrity (specifically, routing correctness), we approach a complementary and equally important problem: data plane reliability. In a data plane attack, the attacker does not attack the routing control logic, but instead directly manipulates the data payloads flowing on the network to cause disruption. We reduce the general problem of data-plane manipulation attacks to two specific attacks: packet dropping and injection, and propose two complementary protocols to address the problem as a whole. We address packet dropping with a probabilistic probing protocol which...
Quantifying Eavesdropping Vulnerability in Sensor Networks With respect to security, sensor networks...
Abstract — Wireless Sensor Networks (WSN) is an emerging technology now-a-days and has a wide range ...
We build up an effective algorithm for detection of selective packet drops made by insider attackers...
In most wireless sensor networks (WSNs), sensor nodes generate data packets and send them to the bas...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
Abstract—Security threat and routing holes in wireless scenario are more frequent than other network...
Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS...
In most wireless sensor networks (WSNs), sensor nodes generate data packets and send them to the bas...
ABSTRACT: In the wireless sensor networks there is the chance for the packets to be dropped due the ...
Wireless sensor networks are an emerging field where a large number of cheap sensors are dispersed o...
Abstract-In this paper, we investigate the impact of hacker attacks by malicious nodes on the overal...
Sensor networks are becoming additional and additional widespread in varied application domains, lik...
Sensor networks are becoming additional and additional widespread in varied application domains, lik...
Opportunistic networks (OppNets) are an interesting topic that are seen to have a promising future. ...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
Quantifying Eavesdropping Vulnerability in Sensor Networks With respect to security, sensor networks...
Abstract — Wireless Sensor Networks (WSN) is an emerging technology now-a-days and has a wide range ...
We build up an effective algorithm for detection of selective packet drops made by insider attackers...
In most wireless sensor networks (WSNs), sensor nodes generate data packets and send them to the bas...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
Abstract—Security threat and routing holes in wireless scenario are more frequent than other network...
Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS...
In most wireless sensor networks (WSNs), sensor nodes generate data packets and send them to the bas...
ABSTRACT: In the wireless sensor networks there is the chance for the packets to be dropped due the ...
Wireless sensor networks are an emerging field where a large number of cheap sensors are dispersed o...
Abstract-In this paper, we investigate the impact of hacker attacks by malicious nodes on the overal...
Sensor networks are becoming additional and additional widespread in varied application domains, lik...
Sensor networks are becoming additional and additional widespread in varied application domains, lik...
Opportunistic networks (OppNets) are an interesting topic that are seen to have a promising future. ...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
Quantifying Eavesdropping Vulnerability in Sensor Networks With respect to security, sensor networks...
Abstract — Wireless Sensor Networks (WSN) is an emerging technology now-a-days and has a wide range ...
We build up an effective algorithm for detection of selective packet drops made by insider attackers...