Compressed sensing-based clone identification in sensor networks
Clone detection, aimed at detecting illegal copies with all of the credentials of legitimate
sensor nodes, is of great importance for sensor networks because of the severe impact of …
sensor nodes, is of great importance for sensor networks because of the severe impact of …
Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks
Wireless sensor networks are often deployed in unattended environments and, thus, an
adversary can physically capture some of the sensors, build clones with the same identity as …
adversary can physically capture some of the sensors, build clones with the same identity as …
Dynamic detection of node replication attacks using X-RED in wireless sensor networks
P Abinaya, C Geetha - International Conference on Information …, 2014 - ieeexplore.ieee.org
Wireless Sensor Networks often deployed in hostile environments, where an attacker can
also capture some nodes. Once a node is captured, the attacker can re-program it and start …
also capture some nodes. Once a node is captured, the attacker can re-program it and start …
Mobile Robot Path Planning Using Polyclonal‐Based Artificial Immune Network
L Deng, X Ma, J Gu, Y Li - Journal of Control Science and …, 2013 - Wiley Online Library
Polyclonal based artificial immune network (PC‐AIN) is utilized for mobile robot path
planning. Artificial immune network (AIN) has been widely used in optimizing the navigation …
planning. Artificial immune network (AIN) has been widely used in optimizing the navigation …
Modeling and designing network defense against control channel jamming attacks: A passivity-based approach
Cyber-physical systems rely on distributed embedded wireless nodes for sensing,
computation, and control, often leaving them vulnerable to intelligent attacks. Detecting and …
computation, and control, often leaving them vulnerable to intelligent attacks. Detecting and …
Sequential hypothesis testing based approach for replica cluster detection in wireless sensor networks
JW Ho - Journal of Sensor and Actuator Networks, 2012 - mdpi.com
In wireless sensor networks, replica node attacks are very dangerous because the attacker
can compromise a single node and generate as many replicas of the compromised node as …
can compromise a single node and generate as many replicas of the compromised node as …
Security and Privacy of Biomedical Cyber-Physical Systems
T Bonaci - 2015 - digital.lib.washington.edu
Advances in cyber-physical systems (CPS), machine learning, big data techniques, and in
cloud computing having been enabling ever more data to be collected about systems and …
cloud computing having been enabling ever more data to be collected about systems and …
[PDF][PDF] Classification and Aanalysis of clone attack detection procedures in mobile wireless sensor networks
M Ansari, V TabatabaVakily - International Journal of Scientific and …, 2012 - academia.edu
In this paper, regarding accelerating development of mobile sensor nodes technology and
increasing the utilization of them and alsothese networks are faced with security challenges; …
increasing the utilization of them and alsothese networks are faced with security challenges; …
[PDF][PDF] Performance analysis and classification of Clone attack detection procedures in mobile wireless sensor networks
MH Ansari, VT Vakili - International Journal of Computer Applications, 2013 - Citeseer
Regarding accelerating development of mobile sensor nodes technology, increasing the
utilization of them, and also facing with security challenges in these networks; specially …
utilization of them, and also facing with security challenges in these networks; specially …