Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2017
DOI: 10.1145/3098243.3098249
|View full text |Cite
|
Sign up to set email alerts
|

Unity is strength!

Abstract: A estation and measurements inspection are di erent but complementary approaches towards the same goal: ascertaining the integrity of sensor nodes in wireless sensor networks. In this paper we compare the bene ts and drawbacks of both techniques and seek to determine how to best combine them. However, our study shows that no single solution exists, as each choice introduces changes in the measurements collection process, a ects the a estation protocol, and gives a di erent balance between the high detection ra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…Subsequent studies have explored techniques for detecting FDIAs from sensor measurements, with the majority of these works based on exploring inter-measurement correlations. Illiano et al [ 16 ] presented an approach to detecting FDIAs in WSNs that combines measurement checks and authentication strategies. Aboelwafa et al [ 17 ] addressed an approach to detecting FDIAs in the industrial Internet of Things that exploits sensor data correlation in time and space.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Subsequent studies have explored techniques for detecting FDIAs from sensor measurements, with the majority of these works based on exploring inter-measurement correlations. Illiano et al [ 16 ] presented an approach to detecting FDIAs in WSNs that combines measurement checks and authentication strategies. Aboelwafa et al [ 17 ] addressed an approach to detecting FDIAs in the industrial Internet of Things that exploits sensor data correlation in time and space.…”
Section: Related Workmentioning
confidence: 99%
“…While some works [ 16 , 21 ] have considered the collusive scenario, further development is needed for when an attacker employs stealthy attacks that construct coherent attack signals (mimicking genuine data distributions and time series patterns). Therefore, in this paper, we propose a generalized detection framework that can be used to detect FDIAs in large-scale WSNs, including stealthy FDIAs.…”
Section: Related Workmentioning
confidence: 99%
“…Ref. [26] presented a method combining a measurement check and authentication strategies to detect FDIAs in WSNs. Ref.…”
Section: Fdias Detection Of Wsnsmentioning
confidence: 99%
“…Although real deployments may be considerably larger (e.g., in the case of forests), within the chosen deployment size we can reasonably rely on measurements inspection only. Within larger deployment areas (e.g., in the order of 10 hectares), we need to complement measurements inspection with other techniques, such as software attestation, as shown in Illiano et al [25].…”
Section: Case Study: Wildfire-monitoring Wireless Sensor Networkmentioning
confidence: 99%