0% found this document useful (0 votes)
39 views

Don't Fool Me!: Detection, Characterization and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks Abstract

This document summarizes a methodology for detecting malicious data injections in wireless sensor networks, characterizing compromised sensors, and distinguishing malicious interference from faulty behaviors. The methodology uses wavelet transforms to counter sophisticated attacks by detecting altered measurements, identifying responsible sensors, and differentiating malicious and genuine measurements experiencing significant variations, especially from simultaneous events. Evaluation with simulated and real data shows the approach achieves better performance than state-of-the-art methods.

Uploaded by

Sasi Murugesan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Don't Fool Me!: Detection, Characterization and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks Abstract

This document summarizes a methodology for detecting malicious data injections in wireless sensor networks, characterizing compromised sensors, and distinguishing malicious interference from faulty behaviors. The methodology uses wavelet transforms to counter sophisticated attacks by detecting altered measurements, identifying responsible sensors, and differentiating malicious and genuine measurements experiencing significant variations, especially from simultaneous events. Evaluation with simulated and real data shows the approach achieves better performance than state-of-the-art methods.

Uploaded by

Sasi Murugesan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Don't fool me!

: Detection, Characterization and Diagnosis of Spoofed


and Masked Events in Wireless Sensor Networks

Abstract:

Wireless Sensor Networks carry a high risk of being compromised since their
deployments are often unattended, physically accessible and the wireless
medium is difficult to secure. Malicious data injections take place when the
sensed measurements are maliciously altered to trigger wrong and potentially
dangerous responses. When many sensors are compromised, they can collude
with each other to alter the measurements making such changes difficult to
detect. Distinguishing between genuine and malicious measurements is even
more difficult when significant variations may be introduced because of events,
especially if more events occur simultaneously. We propose a novel methodology
based on wavelet transform to detect malicious data injections, to characterise
the responsible sensors, and to distinguish malicious interference from faulty
behaviours. The results, both with simulated and real measurements, show that
our approach is able to counteract sophisticated attacks, achieving a significant
improvement over state-of-the-art approaches.

You might also like