2021
DOI: 10.1016/j.comcom.2021.03.007
|View full text |Cite
|
Sign up to set email alerts
|

Data tampering attacks diagnosis in dynamic wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…Berjab et al [ 19 ] presented a method for detecting FDIAs in WSNs, which uses observed spatiotemporal and multivariate attribute sensor correlations. Huang et al [ 20 ] addressed the problem of detecting FDIAs in dynamic WSNs based on spatial correlation. Based on the spatiotemporal correlation, Hu et al [ 21 ] explored the idea of fault diagnosis to detect collusive FDIAs in WSNs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Berjab et al [ 19 ] presented a method for detecting FDIAs in WSNs, which uses observed spatiotemporal and multivariate attribute sensor correlations. Huang et al [ 20 ] addressed the problem of detecting FDIAs in dynamic WSNs based on spatial correlation. Based on the spatiotemporal correlation, Hu et al [ 21 ] explored the idea of fault diagnosis to detect collusive FDIAs in WSNs.…”
Section: Related Workmentioning
confidence: 99%
“…An adversary may employ stealthy attacks, such as constructing coherent attack signals. Most of the works [ 17 , 18 , 19 , 20 , 22 , 23 , 24 ] mentioned based on sensor measurements themselves are effective in detecting simple FDIAs, but not stealthy ones. For instance, in [ 22 ], based on the spatiotemporal correlation of sensor data, the authors used exponential weighted moving average and principal component analysis to establish a rotated ellipse area for each pair of sensors in a correlation group and detected FDIAs by determining whether the current sensor readings for each pair of sensors were located within the corresponding area of the rotated ellipse.…”
Section: Related Workmentioning
confidence: 99%
“…The adversary has access to sensitive data from the sensor node, such as security keys and data. Da-Wen Huang et al, 2021 76 propose an algorithm for hybrid diagnosis to detect attacks on dynamic WSNs. The suggested hybrid diagnostic method involves three stages: data comparison, distributed diagnosis, and global diagnosis.…”
Section: Physical Layer Attacksmentioning
confidence: 99%
“…Black Hole and Gray Hole attacks are active attacks since they influence network performance and create crashes [45].…”
Section: Holes Attacksmentioning
confidence: 99%