Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …
some form of smart device in their homes or workplaces. These devices are often off-the …
Node capture attacks in wireless sensor networks: A system theoretic approach
T Bonaci, L Bushnell… - 49th IEEE Conference on …, 2010 - ieeexplore.ieee.org
In this paper we address the problem of physical node capture attacks in wireless sensor
networks and provide a control theoretic framework to model physical node capture, cloned …
networks and provide a control theoretic framework to model physical node capture, cloned …
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach
C Lin, G Wu - The Journal of Supercomputing, 2013 - Springer
In the node capture attack, the adversary intelligently captures nodes and extracts the
cryptographic keys from their memories to destroy the security, reliability and confidentiality …
cryptographic keys from their memories to destroy the security, reliability and confidentiality …
Maximizing destructiveness of node capture attack in wireless sensor networks
As a special kind of attack, node capture attack in wireless sensor networks destroys the
confidentiality and integrity of network traffic by physically capturing sensor nodes and …
confidentiality and integrity of network traffic by physically capturing sensor nodes and …
A multi objective optimization modeling in WSN for enhancing the attacking efficiency of node capture attack
P Ahlawat, R Bathla - … Journal of System Assurance Engineering and …, 2023 - Springer
Node capture attacks compromise the integrity and confidentiality of networks by capturing
nodes within them and obtaining cryptographic keys through wireless sensor network links …
nodes within them and obtaining cryptographic keys through wireless sensor network links …
Enhancing efficiency of node compromise attacks in vehicular ad-hoc networks using connected dominating set
In the node compromise attack, the adversary physically captures nodes and extracts the
cryptographic keys from the memories, which destroys the security, reliability and …
cryptographic keys from the memories, which destroys the security, reliability and …
Compromising ad-hoc networks by attacking weakly connected dominating set
C Lin, G Wu, K Yim, L Yao, G Hou - 2015 9th International …, 2015 - ieeexplore.ieee.org
As a special kind of attack, the node compromise attack destroy security, reliability and
confidentiality of ad-hoc networks. However, previous research paid little attention on …
confidentiality of ad-hoc networks. However, previous research paid little attention on …
Security and Privacy of Biomedical Cyber-Physical Systems
T Bonaci - 2015 - digital.lib.washington.edu
Advances in cyber-physical systems (CPS), machine learning, big data techniques, and in
cloud computing having been enabling ever more data to be collected about systems and …
cloud computing having been enabling ever more data to be collected about systems and …
[PDF][PDF] Matrix based optimal solution for node capture attack to enhance the attacking efficiency of attacker
R Bathla - 2023 - scholar.archive.org
A node capture attack inside a wireless sensor network (WSN) may destroy the network by
capturing sensor nodes and fetching cryptographic keys within the connections. Adversarial …
capturing sensor nodes and fetching cryptographic keys within the connections. Adversarial …
[PDF][PDF] Enhance the attacking efficiency of the node compromise attack in vehicular Ad-hoc network using connected dominating set
In the node compromise attack, the adversary physically captures nodes and extracts the
cryptographic keys from the memories, which destroys the security, reliability and …
cryptographic keys from the memories, which destroys the security, reliability and …