The fundamental objective of sensor networks underpinning a variety of applications is the collection of reliable information from the surrounding environment. The correctness of the collected data is especially important in applications involving societal welfare and safety, in which the acquired information may be utilized by end-users for decision-making. The distributed nature of sensor networks and their deployment in unattended and potentially hostile environments, however, renders this collection task challenging for both scalar and visual data. In this work we propose and address the twin problem of carrying out and defending against a stealthy attack on the information gathered by a sensor network at the physical sensing layer as p...
The data collected by sensor networks often contain sensitive information and care must be taken to ...
Comprised of a large number of low-cost, low-power, mobile and miniature sensors, wireless sensor ne...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Wireless sensor networks (WSNs) pose unique security challenges due to the fact that their nodes ope...
Wireless sensor networks are a promising technology for many real-world applications such as critica...
Unattended sensor networks operating in hostile environments might collect data that represents a hi...
With respect to security, sensor networks have a number of considerations that separate them from tr...
Every day we share our personal information through digital systems which are constantly exposed to ...
Surveillance has always been an important task for human beings either for protecting a precious ass...
Abstract—Insufficiency of memory and battery power of sensors makes the security of sensor networks ...
This paper considers the problem of security allocation in a networked control system under stealthy...
This thesis explores security issues in wireless sensor networks (WSNs), and network-layer counterme...
Abstract — Wireless sensor and actor networks are a group of sensors and actors linked by wireless m...
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless s...
This paper develops a glocal (global-local) attack detection framework to detect stealthy cyber-phys...
The data collected by sensor networks often contain sensitive information and care must be taken to ...
Comprised of a large number of low-cost, low-power, mobile and miniature sensors, wireless sensor ne...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Wireless sensor networks (WSNs) pose unique security challenges due to the fact that their nodes ope...
Wireless sensor networks are a promising technology for many real-world applications such as critica...
Unattended sensor networks operating in hostile environments might collect data that represents a hi...
With respect to security, sensor networks have a number of considerations that separate them from tr...
Every day we share our personal information through digital systems which are constantly exposed to ...
Surveillance has always been an important task for human beings either for protecting a precious ass...
Abstract—Insufficiency of memory and battery power of sensors makes the security of sensor networks ...
This paper considers the problem of security allocation in a networked control system under stealthy...
This thesis explores security issues in wireless sensor networks (WSNs), and network-layer counterme...
Abstract — Wireless sensor and actor networks are a group of sensors and actors linked by wireless m...
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless s...
This paper develops a glocal (global-local) attack detection framework to detect stealthy cyber-phys...
The data collected by sensor networks often contain sensitive information and care must be taken to ...
Comprised of a large number of low-cost, low-power, mobile and miniature sensors, wireless sensor ne...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...