© IFIP International Federation for Information Processing 2015. In this work we present an Intrusion Detection (ID) and an Intrusion Prevention (IP) model for Wireless Sensor Networks (WSNs). The attacker’s goal is to compromise the deployment by causing nodes to report faulty sensory information. The defender, who is the WSN’s operator, aims to detect the presence of faulty sensor measurements (ID) and to subsequently recover compromised nodes (IP). In order to address the conflicting interests involved, we adopt a Game Theoretic approach that takes into consideration the strategies of both players and we attempt to identify the presence of Nash Equilibria in the two games. The results are then verified in two simulation contexts: Firstly...
open access articleInsiders might have incentives and objectives opposed to those of the belonging o...
Abstract- The problem of detecting malicious nodes in wireless sensor networks is considered. Since ...
© 2018 Elsevier Inc. An effective security strategy for Wireless Sensor Networks (WSNs) is imperativ...
© IFIP International Federation for Information Processing 2015. In this work we present an Intrusio...
Part 9: Cyber-physical Systems and Critical Infrastructures SecurityInternational audienceIn this wo...
Sensor networks are being increasingly deployed in many application domains ranging from environment...
Abstract—Insufficiency of memory and battery power of sensors makes the security of sensor networks ...
AbstractAs Wireless Sensor Networks (WSNs) become increasingly popular, it is necessary to require I...
© 2016 by the authors; licensee MDPI, Basel, Switzerland. We present a study of using game theory fo...
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish ...
Abstract — Wireless sensor networks has grown a lot in recent years and offers excellent opportuniti...
The unattended nature of wireless sensor networks makes them very vulnerable to an adversary's malic...
Insiders might have incentives and objectives opposed to those of the belonging organization. It is ...
Abstract — Wireless sensor and actor networks are a group of sensors and actors linked by wireless m...
This paper is to solve the problem stating that applying Intrusion Detection System (IDS) to guarant...
open access articleInsiders might have incentives and objectives opposed to those of the belonging o...
Abstract- The problem of detecting malicious nodes in wireless sensor networks is considered. Since ...
© 2018 Elsevier Inc. An effective security strategy for Wireless Sensor Networks (WSNs) is imperativ...
© IFIP International Federation for Information Processing 2015. In this work we present an Intrusio...
Part 9: Cyber-physical Systems and Critical Infrastructures SecurityInternational audienceIn this wo...
Sensor networks are being increasingly deployed in many application domains ranging from environment...
Abstract—Insufficiency of memory and battery power of sensors makes the security of sensor networks ...
AbstractAs Wireless Sensor Networks (WSNs) become increasingly popular, it is necessary to require I...
© 2016 by the authors; licensee MDPI, Basel, Switzerland. We present a study of using game theory fo...
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish ...
Abstract — Wireless sensor networks has grown a lot in recent years and offers excellent opportuniti...
The unattended nature of wireless sensor networks makes them very vulnerable to an adversary's malic...
Insiders might have incentives and objectives opposed to those of the belonging organization. It is ...
Abstract — Wireless sensor and actor networks are a group of sensors and actors linked by wireless m...
This paper is to solve the problem stating that applying Intrusion Detection System (IDS) to guarant...
open access articleInsiders might have incentives and objectives opposed to those of the belonging o...
Abstract- The problem of detecting malicious nodes in wireless sensor networks is considered. Since ...
© 2018 Elsevier Inc. An effective security strategy for Wireless Sensor Networks (WSNs) is imperativ...