Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems
DOI: 10.1109/dssns.2006.4
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Actuation Attacks in Wireless Sensor Networks: Implications and Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…Our framework is unique within existing, rule-based, security assessment strategies [16] [17] [18]. It enables the security quantification of both the WSN and the application to be performed.…”
Section: Our Proposed Security Assessment Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…Our framework is unique within existing, rule-based, security assessment strategies [16] [17] [18]. It enables the security quantification of both the WSN and the application to be performed.…”
Section: Our Proposed Security Assessment Frameworkmentioning
confidence: 99%
“…The lack of computation power in non-intelligent nodes become key constraints on open system implementation, since child sensor nodes are not designed to make crucial decisions. -Hybrid models: Like other networks, sensor networks are mobile, ad hoc and sometimes disparate hybrid models [16]. In these models, the trust domain among sensor nodes can be rare or highly complex to achieve.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Some critical applications such as battle-field surveillance may experience both harsh and hostile conditions. Importantly, occasional errors caused by harsh or hostile elements may occur with vastly different frequency than wireless transmission errors [4]. Whereas coded wireless transmission and decoding might produce a bit error with probability between 10 −6 to 10 −9 , the erroneous reporting rate of a particular scalar-sensor is not as easy to ascertain.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, harsh environments of interest might include infrastructure in seismically active areas, or wildlife monitoring in remote rainforests [1], [2]. In hostile environments on the other hand, faulty sensor reporting may be caused by a malicious opponent engaged in false-packet injection, actuation of sensed-data or other sensor network attacks [4]. Some critical applications such as battle-field surveillance may experience both harsh and hostile conditions.…”
Section: Introductionmentioning
confidence: 99%