We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits a linear combination of the values in its neighborhood. For certain topologies, we showed that these linear combinations can be designed so that the closed loop system is stable (i.e., the wireless network itself acts as a controller for the plant). In this paper, we design a Intrusion Detection System (IDS) for this control scheme, which observes the transmissions of certain nodes in the network and uses that information to (a) recover the plant outputs (for data-logging and diagnostic purposes) and (b) identify malicious behavior by any of the wireless n...
Abstract—The presence of malicious nodes in Ad-hoc networks, which operate without a central adminis...
This paper presents a novel approach to identifying illegitimate nodes in wireless networks. We demo...
Wireless Ad-hoc networks are formed by wireless devices that facilitate communication through cooper...
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes...
We present a method to stabilize a plant with a network of resource constrained wireless nodes. As o...
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes...
Clusters consist of circulated sensors and motor that interact with each other via wireless network....
While wireless sensor networks are proving to be a versatile tool, many of the applications in which...
Abstract — In this paper we investigate the DoS attack detection and mitigation problem in wireless ...
The pervasiveness of wireless devices and the architectural organization of wireless networks in dis...
The presence of malicious nodes in Ad-hoc networks, which operate without a central administration i...
Abstract- Security plays an major role in the ability to deploy and access trustworthy information f...
Wireless sensor networks (WSNs) pose unique security challenges due to the fact that their nodes ope...
We present a distributed scheme used for control over a network of wireless nodes. As opposed to tra...
We present a method to stabilize a plant with a network of resource constrained wireless nodes. As o...
Abstract—The presence of malicious nodes in Ad-hoc networks, which operate without a central adminis...
This paper presents a novel approach to identifying illegitimate nodes in wireless networks. We demo...
Wireless Ad-hoc networks are formed by wireless devices that facilitate communication through cooper...
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes...
We present a method to stabilize a plant with a network of resource constrained wireless nodes. As o...
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes...
Clusters consist of circulated sensors and motor that interact with each other via wireless network....
While wireless sensor networks are proving to be a versatile tool, many of the applications in which...
Abstract — In this paper we investigate the DoS attack detection and mitigation problem in wireless ...
The pervasiveness of wireless devices and the architectural organization of wireless networks in dis...
The presence of malicious nodes in Ad-hoc networks, which operate without a central administration i...
Abstract- Security plays an major role in the ability to deploy and access trustworthy information f...
Wireless sensor networks (WSNs) pose unique security challenges due to the fact that their nodes ope...
We present a distributed scheme used for control over a network of wireless nodes. As opposed to tra...
We present a method to stabilize a plant with a network of resource constrained wireless nodes. As o...
Abstract—The presence of malicious nodes in Ad-hoc networks, which operate without a central adminis...
This paper presents a novel approach to identifying illegitimate nodes in wireless networks. We demo...
Wireless Ad-hoc networks are formed by wireless devices that facilitate communication through cooper...