Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The paper discusses the threats to networks of resource-limited things such as wireless sensors and the different mechanisms used to deal with them. A novel approach to threat detection is proposed. MOTHON is a movement-assisted threat detection system using mobility to enhance a global threat assessment and provide a separate physical secure channel to deliver collected information.
Rocznik
Tom
Strony
10--14
Opis fizyczny
Bibliogr. 14 poz., rys.
Twórcy
autor
- Research and Academic Computer Network (NASK), Warsaw, Poland
autor
- Research and Academic Computer Network (NASK), Warsaw, Poland
autor
- Research and Academic Computer Network (NASK), Warsaw, Poland
Bibliografia
- [1] H. K. Kalita and A. Kar, "Wireless sensor networks security analysis", Int. J. of Next Gener. Netw., vol. 1, no. 1, pp. 1-9, 2009.
- [2] Z. S. Bojkovic, B. M. Bakmaz, and M. R. Bakmaz, "Security issues in wireless sensor networks", NAUN Int. J. Commun., vol. 2, no. 1, pp. 106-115, 2008.
- [3] I. Butun, S. D. Morgera, and R. Sankar, "A survey of intrusion detection systems in wireless sensor networks", IEEE Commun. Surveys & Tutorials, vol. 16, no. 1, pp. 266-282, 2014.
- [4] IEEE standard for part 15.4: IEEE Std. 802.15.4, IEEE, New York, Oct. 2011.
- [5] C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks", in Proc. 2nd ACM Conf. on Embedded Netw. Sensor Syst. SenSys 2004, Baltimore, Maryland, USA, 2004, pp. 162-175.
- [6] M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "MiniSec: a secure sensor network communication architecture", in Proc. 6th Int. Conf. on Inform. Process. in Sensor Netw. IPSN'07, Cambridge, MA, USA, 2007.
- [7] L. Casado and P. Tsigas, "ContikiSec: A secure network layer for wireless sensor networks under the Contiki operating system", in Proc. 14th Nordic Conf. on Secure IT Syst.: Identity and Privacy in the Internet Age NordSec 2009, Oslo, Norway, 2009, pp. 133-147.
- [8] S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks", ACM Trans. on Sensor Netw., vol. 2, no. 4, pp. 500-528, 2006.
- [9] A. Felkner, "How the Role-based trust management can be applied to wireless sensor networks", J. Telecommun. Inform. Technol., no. 4, pp. 70-77, 2012.
- [10] G. Saurabh, L. K. Balzano, and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks", ACM Trans. on Sensor Netw., vol 4, no. 3, 2008.
- [11] F. Hu, J. Ziobro, J. Tillett, and N. K. Sharma, "Secure wireless sensor networks: problems and solutions", J. Syst., Cybernet. and Inform., vol. 1, no. 4, pp. 90-100, 2003.
- [12] G. Huo, X. Wang, "DIDS: A dynamic model of intrusion detection system in wireless sensor networks", in Proc. IEEE Int. Conf. on Inform. Autom. ICIA 2008, 2008, ZhangJiaJie, China, pp. 374-378.
- [13] M. Marks, E. Niewiadomska-Szynkiewicz, and J. Kolodziej, "An integrated software framework for localization in wireless sensor network", Comput. and Inform., vol. 33, no. 2, pp. 369-386, 2014.
- [14] M. Marks, E. Niewiadomska-Szynkiewicz, and J. Kolodziej, "High performance wireless sensor network localization system", Int. J. Ad Hoc and Ubiquitous Comput., vol. 17, no. 32, pp. 122-133, 2014.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e638969f-33d2-4a56-a04c-6c42a6367293