Robust regression and outlier detection
Robust regression and outlier detection
Implementation of integrity constraints and views by query modification
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
Security in Computing
Consistency Checking in Complex Object Database Schemata with Integrity Constraints
IEEE Transactions on Knowledge and Data Engineering
Checking Consistency of Database Constraints: a Logical Basis
VLDB '86 Proceedings of the 12th International Conference on Very Large Data Bases
TAG: a Tiny AGgregation service for ad-hoc sensor networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
Hi-index | 0.00 |
Adversaries do not need to attack traditional security services to affect the operation of a sensor network, but may deliberately perturb the measurement environment, the measurement method, or the measurement infrastructure. These types of attacks, which are attacks on the process of measurement(PoM attacks), are unique to sensor networks and cannot be addressed through the usual security methods. Hence, to complement traditional security services, defense mechanisms are needed to protect the sensor network from PoM attacks. This paper lays out a framework for assuring the validity of measurement data in sensor networks. This framework, which we call the Methods and Infrastructure for the Assurance of Measurement Information (MIAMI), is centered around the development of the PoM monitor. The PoM monitor is responsible for preventing corrupted measurement data from ever reaching core sensor services. We map out several mechanisms for that might be useful for building the PoM monitor on sensor nodes, and examine how it would operate by applying the techniques to the detection of wireless interference in a sensor network.