2017
DOI: 10.1016/j.cose.2016.10.003
|View full text |Cite
|
Sign up to set email alerts
|

Misuse-based detection of Z-Wave network attacks

Abstract: Technology. His research focuses on wireless computer network security and critical infrastructure protection. Benjamin teaches graduate courses in secure software design and reverse engineering.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…At the same time, this paper combines the actual situation of power system and proposes security protection measures for the power system information communication network. Even so, as the security system requirements for power system information continue to improve, it is still necessary to further strengthen network security and protection measures [7].…”
Section: Discussionmentioning
confidence: 99%
“…At the same time, this paper combines the actual situation of power system and proposes security protection measures for the power system information communication network. Even so, as the security system requirements for power system information continue to improve, it is still necessary to further strengthen network security and protection measures [7].…”
Section: Discussionmentioning
confidence: 99%
“…The study [20] describes in detail the discovered vulnerability of the door locks Z-Wave through interception of communication and subsequently injecting these obtained data to the communication channel. However, it is necessary to say that the works are also bringing the actions, for example, [21] is bringing the action in form of improvement of the intrusion detection system for Z-Wave communication.…”
Section: Resultsmentioning
confidence: 99%
“…In addition, the authors managed to perform a black hole attack by taking advantage of the discovered vulnerabilities. Another work by some of the same authors [73] extends and experimentally evaluates a "Z-Wave Misuse-Based Intrusion Detection System (MBIDS)" originally proposed in [74].…”
Section: Z-wavementioning
confidence: 99%