Learn More
—Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts arbitrary number of replicas into the network. Consequently , the adversary can carry out many internal attacks. Previous solutions on detecting clone attacks have several(More)
Many sensor network applications rely on sensors' location information. However, most of existing location algorithms assume a non-adversarial environment or assume beacons lying within 1-hop. In this paper, we focus on Hop-Count based lo-calization (multihop) and develop a Secure HOp-Count based LOCalization scheme, called SHOLOC, to make localization(More)
—Many secure localization algorithms have been proposed. In these algorithms, collusion attack is usually considered as the strongest attack when evaluating their performance. Also, for ensuring correct localization under the collusion attack, a necessary number of normal beacons are needed and a lower bound on this number has been established (assuming the(More)
Today, there are many hybrid apps in which both native Android app UI and WebView UI are used. To protect the security and privacy of the communications, these hybrid apps all use HTTPS by WebView, a key component in modern web browser. In this paper, we show there is another type of SSL vulnerability that stems from the error-handling code in the hybrid(More)
Accurate network traffic classification is fundamental to numerous network activities, from Quality of Service to providing operators with useful forecasts for long-term provisioning. In this paper, we apply the discretization method in Naive Bayes for internet traffic identification and compare the result with that of previously applied Naive Bayes kernel(More)