DOI: 10.4018/978-1-60960-123-2.ch011
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks

Abstract: This chapter focuses on an important, challenging and yet largely unaddressed problem in Wireless Sensor Networks (WSN) data communication: detecting cheating aggregators and malicious/selfish discarding of data reports en route to the Base Stations (BSs). If undetected, such attacks can significantly affect the performance of applications. The goal is to make the aggregation process tamper-resistant so that the aggregator cannot report arbitrary values, and to ensure that silent discarding of data reports by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Also, it is not possible to find a unique set of features (or set of dimensions) to characterize a threat (or a family of threat) reasonably and reliably [113] . Moreover, in the application domain of cyber security, finding a set of particular features (statistically independent) which can distinctly detect cyber threats uniquely is a NP-Hard problem [206]. Further, new and advanced mutation tools and increasing cognitive intelligence of malware objects have made it possible to change the malware feature set very quickly e.g.…”
Section: Class Inseparabilitymentioning
confidence: 99%
“…Also, it is not possible to find a unique set of features (or set of dimensions) to characterize a threat (or a family of threat) reasonably and reliably [113] . Moreover, in the application domain of cyber security, finding a set of particular features (statistically independent) which can distinctly detect cyber threats uniquely is a NP-Hard problem [206]. Further, new and advanced mutation tools and increasing cognitive intelligence of malware objects have made it possible to change the malware feature set very quickly e.g.…”
Section: Class Inseparabilitymentioning
confidence: 99%