Optimal attack and reinforcement of a network
Journal of the ACM (JACM)
Decentralized erasure codes for distributed networked storage
IEEE/ACM Transactions on Networking (TON) - Special issue on networking and information theory
When good instructions go bad: generalizing return-oriented programming to RISC
Proceedings of the 15th ACM conference on Computer and communications security
On the difficulty of software-based attestation of embedded devices
Proceedings of the 16th ACM conference on Computer and communications security
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Pervasive and Mobile Computing
Pollution Attack Defense for Coding Based Sensor Storage
SUTC '10 Proceedings of the 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
Computers & Mathematics with Applications
A hidden Markov model based intrusion detection system for wireless sensor networks
International Journal of Critical Computer-Based Systems
Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
Clone wars: Distributed detection of clone attacks in mobile WSNs
Journal of Computer and System Sciences
Hi-index | 0.01 |
The protection of critical infrastructures provides an interesting application area for wireless sensor networks. Threats such as natural catastrophes, criminal or terrorist attacks against CIs are increasingly reported. The large-scale nature of CIs requires a scalable and low-cost technology for improving CI monitoring and surveillance. WSNs are a promising candidate to fulfill these requirements, but if the WSN becomes part of the CI in order to improve its reliability, then the dependability of the WSN itself needs to be significantly improved first. In this article we discuss the challenges and potential solutions to achieve dependability of WSNs taking into account accidental failures as well as intentional attacks. We inspect the whole system starting from individual sensor nodes via the protocol stack to the middleware layer above.