[go: up one dir, main page]

Tedeschi et al., 2017 - Google Patents

Statistically-enhancing the diagnosis of packet losses in WSNs

Tedeschi et al., 2017

View PDF
Document ID
13877205520693233810
Author
Tedeschi A
Midi D
Benedetto F
Bertino E
Publication year
Publication venue
International Journal of Mobile Network Design and Innovation

External Links

Snippet

Packet losses, an important class of adverse events in wireless sensor networks, can be caused by either misbehaving nodes, or attacks focused on the wireless links. Understanding the underlying cause is critical for effective response measures to restore …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/02Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/06Report generation
    • H04L43/062Report generation for traffic related reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Similar Documents

Publication Publication Date Title
Upadhyaya et al. Machine learning-based jamming detection in wireless IoT networks
Sarigiannidis et al. Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information
Min et al. Attack-tolerant distributed sensing for dynamic spectrum access networks
Min et al. Robust cooperative sensing via state estimation in cognitive radio networks
US9485660B2 (en) Systems and methods to detect and characterize fake cell towers
O’Mahony et al. Detecting interference in wireless sensor network received samples: A machine learning approach
Fayssal et al. Anomaly-based behavior analysis of wireless network security
Dasgupta et al. MMDS: multilevel monitoring and detection system
Alsajri et al. Enhancing IoT security to leveraging ML for DDoS attack prevention in distributed network routing
Chen et al. A density based scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks
Choi et al. Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attack
Tedeschi et al. Statistically-enhancing the diagnosis of packet losses in WSNs
Mendonça et al. An extremely lightweight approach for ddos detection at home gateways
Min et al. Robust tracking of small-scale mobile primary user in cognitive radio networks
Hussain et al. Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks
Midi et al. Node or link? Fine-grained analysis of packet-loss attacks in wireless sensor networks
Kailkhura et al. On the performance analysis of data fusion schemes with Byzantines
Midi et al. Statistically-enhanced fine-grained diagnosis of packet losses
Yurdagul et al. Blekeeper: Response time behavior based man-in-the-middle attack detection
Panos et al. An evaluation of anomaly-based intrusion detection engines for mobile ad hoc networks
AlBusaidi et al. Analysis of Wireless Sensor Network Security Models: A Salient Approach for Deeper Inspection Using Deep Neural Networks
Avram et al. Analyzing attacks in wireless ad hoc network with self-organizing maps
An et al. Efficiency and detectability of random reactive jamming in wireless networks
Lichtman et al. Anomaly-based intrusion detection of protocol-aware jamming
Akbari et al. A fault-tolerant cooperative spectrum sensing algorithm over cognitive radio network based on wireless sensor network