Wireless Sensor Networks are often distributed, diverse, and large making their monitoring and anomaly localisation hard. Anomaly may pertain to parts of topology unknown in the ground truth. It is advantageous to localise anomaly, ideally using data at the edge which helps to implement countermeasures such as threat containment and attacker localisation. In this manuscript a method allowing localisation of sensors with malicious topology change and ground truth acquisition is presented. A simulated wireless sensor network is used to acquire data at the edge and apply the method. We demonstrate detection of malicious topology change based on topology distance measure and localisation of sensors impacted by the change using the data availabl...
Wireless sensor networks (WSNs) have gained researchers ’ attention in the last several years. Small...
Wireless Sensor Networks (WSNs) can experience problems (anomalies) during deployment, due to dynami...
As sensor-based networks become more prevalent, scaling to unmanageable numbers or deployed in diffi...
In wireless sensor networks (WSNs), sensors ’ locations play a critical role in many applications. H...
Although the specifics of sensor network deployment scenarios are entirely application domain specif...
The reliability of the localization of Wireless Sensor Networks in presence of errors or malicious d...
In the last decade, wireless sensor networks deployed at an accelerated pace in military, industrial...
28th Signal Processing and Communications Applications Conference (SIU) -- OCT 05-07, 2020 -- ELECTR...
The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capabilit...
Wireless sensor networks (WSNs) can provide real-time in-formation about geospatial environments, an...
Abstract — In a wireless sensor network (WSN), the sensor nodes (SNs) generally localize themselves ...
The 6th International Conference on Ubiquitous Intelligence and Computing (UIC 2009), Brisbane, Aust...
AbstractThe field of wireless sensor networks (WSNs), embedded systems with sensing and networking c...
Geolocalization of nodes in a wireless sensor network is a process that allows location-unaware node...
Many Wireless Sensor Network (WSN) protocols require the location coordinates or a map of the sensor...
Wireless sensor networks (WSNs) have gained researchers ’ attention in the last several years. Small...
Wireless Sensor Networks (WSNs) can experience problems (anomalies) during deployment, due to dynami...
As sensor-based networks become more prevalent, scaling to unmanageable numbers or deployed in diffi...
In wireless sensor networks (WSNs), sensors ’ locations play a critical role in many applications. H...
Although the specifics of sensor network deployment scenarios are entirely application domain specif...
The reliability of the localization of Wireless Sensor Networks in presence of errors or malicious d...
In the last decade, wireless sensor networks deployed at an accelerated pace in military, industrial...
28th Signal Processing and Communications Applications Conference (SIU) -- OCT 05-07, 2020 -- ELECTR...
The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capabilit...
Wireless sensor networks (WSNs) can provide real-time in-formation about geospatial environments, an...
Abstract — In a wireless sensor network (WSN), the sensor nodes (SNs) generally localize themselves ...
The 6th International Conference on Ubiquitous Intelligence and Computing (UIC 2009), Brisbane, Aust...
AbstractThe field of wireless sensor networks (WSNs), embedded systems with sensing and networking c...
Geolocalization of nodes in a wireless sensor network is a process that allows location-unaware node...
Many Wireless Sensor Network (WSN) protocols require the location coordinates or a map of the sensor...
Wireless sensor networks (WSNs) have gained researchers ’ attention in the last several years. Small...
Wireless Sensor Networks (WSNs) can experience problems (anomalies) during deployment, due to dynami...
As sensor-based networks become more prevalent, scaling to unmanageable numbers or deployed in diffi...