Compressed sensing-based clone identification in sensor networks

CM Yu, CS Lu, SY Kuo - IEEE Transactions on wireless …, 2016 - ieeexplore.ieee.org
Clone detection, aimed at detecting illegal copies with all of the credentials of legitimate
sensor nodes, is of great importance for sensor networks because of the severe impact of …

Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks

WB Jaballah, M Conti, G Filè, M Mosbah… - Computer …, 2018 - Elsevier
Wireless sensor networks are often deployed in unattended environments and, thus, an
adversary can physically capture some of the sensors, build clones with the same identity as …

Dynamic detection of node replication attacks using X-RED in wireless sensor networks

P Abinaya, C Geetha - International Conference on Information …, 2014 - ieeexplore.ieee.org
Wireless Sensor Networks often deployed in hostile environments, where an attacker can
also capture some nodes. Once a node is captured, the attacker can re-program it and start …

Mobile Robot Path Planning Using Polyclonal‐Based Artificial Immune Network

L Deng, X Ma, J Gu, Y Li - Journal of Control Science and …, 2013 - Wiley Online Library
Polyclonal based artificial immune network (PC‐AIN) is utilized for mobile robot path
planning. Artificial immune network (AIN) has been widely used in optimizing the navigation …

Modeling and designing network defense against control channel jamming attacks: A passivity-based approach

P Lee, A Clark, L Bushnell, R Poovendran - Control of Cyber-Physical …, 2013 - Springer
Cyber-physical systems rely on distributed embedded wireless nodes for sensing,
computation, and control, often leaving them vulnerable to intelligent attacks. Detecting and …

Sequential hypothesis testing based approach for replica cluster detection in wireless sensor networks

JW Ho - Journal of Sensor and Actuator Networks, 2012 - mdpi.com
In wireless sensor networks, replica node attacks are very dangerous because the attacker
can compromise a single node and generate as many replicas of the compromised node as …

Security and Privacy of Biomedical Cyber-Physical Systems

T Bonaci - 2015 - digital.lib.washington.edu
Advances in cyber-physical systems (CPS), machine learning, big data techniques, and in
cloud computing having been enabling ever more data to be collected about systems and …

[PDF][PDF] Classification and Aanalysis of clone attack detection procedures in mobile wireless sensor networks

M Ansari, V TabatabaVakily - International Journal of Scientific and …, 2012 - academia.edu
In this paper, regarding accelerating development of mobile sensor nodes technology and
increasing the utilization of them and alsothese networks are faced with security challenges; …

[PDF][PDF] Performance analysis and classification of Clone attack detection procedures in mobile wireless sensor networks

MH Ansari, VT Vakili - International Journal of Computer Applications, 2013 - Citeseer
Regarding accelerating development of mobile sensor nodes technology, increasing the
utilization of them, and also facing with security challenges in these networks; specially …

[引用][C] Detection of Clone Attacks in WSNs–A Survey

C Geetha, M Ramakrishnan - Asian Journal of Computer and Information Systems, 2013