F4: large-scale automated forecasting using fractals
Proceedings of the eleventh international conference on Information and knowledge management
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Designing Good Deceptions in Defense of Information Systems
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
A lightweight intrusion detection framework for wireless sensor networks
Wireless Communications & Mobile Computing
A hierarchical anonymous communication protocol for sensor networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Hi-index | 0.00 |
Manipulation is used as a behavior mechanism to achieve a certain goal. In this paper we propose a framework for manipulation in sensor networks where an attacker is manipulated with a long term objective in view. In particular an approach for selecting manipulation nodes is presented. Results show that the proposed scheme improves the security of the network by allowing more of the network to operate normally even when under attack. A manipulation scheme for a Denial of Service attack is proposed. A prediction based scheme is used to drive the manipulation.