The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a Wireless Sensor Network (WSN) Nodes are distributed to monitor an area of interest such as a military battlefield, and transmit their data to in-situ Base-Station (BS) through multi-hop paths. In addition to collecting and processing the sensor data, the BS performs network management tasks. Due to such an important role, an adversary would try to locate the BS and target it with Denial-of-Service...
Wireless sensor networks (WSNs) may consist of a large number of resource-constrained sensor nodes. These nodes probe their surroundings and transmit their measurements over multi-hop routes to an in-situ Base-Station (BS). Given the critical role of the BS, it can be targeted by an adversary's attack. Basically, the adversary may intercept transmissions made by the individual nodes, even without...
In applications of wireless Sensor Networks (WSNs), the base-station (BS) acts as a sink for all data traffic. The continuous flow of packets toward the BS enables the adversary to analyze the traffic and uncover the BS position. In this paper we present a technique to counter such an attack by morphing the traffic pattern in the WSN. Our approach introduces multiple fake sinks and deceptive relays...
Wireless Sensor Networks (WSNs) have become an attractive choice for many applications that serve in hostile setup. The operation model of a WSN makes it possible for an adversary to determine the location of the base-station (BS) in the network by intercepting transmissions and employing traffic analysis techniques such as Evidence Theory. By locating the BS, the adversary can then target it with...
Wireless Sensor Networks (WSNs) often operate in inhospitable environments to serve mission-critical and security-sensitive applications that involve hostile adversaries. These adversaries are eager to disrupt the WSN operation. Given the important role that the base-station (BS) plays in a WSN, the adversary opts to identify the BS and determine its location in order to damage the BS or launch a...
Wireless Sensor Networks (WSNs) can be deployed to serve mission-critical applications in hostile environments such as battlefield and territorial borders. In these setups, the WSN may be subject to attacks in order to disrupt the network operation. The most effective way for an adversary to do so is by targeting the Base-Station (BS), where the sensor data are collected in the field. By identifying...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.