Su Man Nam

  • Citations Per Year
Learn More
Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports(More)
False report injection attacks and false vote injection attacks can be perpetrated easily by malicious attackers on the application layer in a wireless sensor network. These attacks drain the lifetime of the sensor nodes and prevent the forwarding of legitimate reports in the sensor network. A probabilistic voting-based filtering scheme (PVFS) was proposed(More)
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injected attack which takes place on application layer is elected by the compromised node. If the false report arrives in a base station, a false alarm is occurred, and the energy of the nodes is consumed. To detect the false report, statistical en-route filtering(More)
An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple attacks through compromised nodes, such as false vote injection attacks and false report injection attacks. The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report injection attack tries to drain the(More)
In a wireless sensor network, various attacks such as the false injection attack, easily occur by malicious attackers. This attack drains the finite energy resources of each node to destroy functions of the sensor network. SEF (statistical en-route filtering scheme) was proposed to probabilistically detect the false reports in intermediate nodes while(More)
Nodes are easily exposed from generated attacks on various layers because they compose simple functions in sensor networks. The false data injection attack drains finite energy resource in a compromised node, and the false HELLO flood attack threatens constructed routing paths in an adversary node. A localized encryption and authentication protocol (LEAP)(More)
In wireless sensor networks, adversaries can harm the sensor nodes by launching attacks such as the false report injection and the false vote injection. These attacks drain finite energy resources and drop legitimate event information in the sensor network. A probabilistic voting-based filtering scheme (PVFS) detects fabricated votes at the verification(More)
Recent literature on text-tagging reported successful results by applying Maximum Entropy (ME) models. In general, ME taggers rely on carefully selected binary features, which try to capture discriminant information from the training data. This paper introduces a standard setting of binary features, inspired by the literature on named-entity recognition and(More)
In a large-scale wireless sensor network, damage spreads rapidly in the network when under false report injection, false votes injection, or wormhole attacks. These attacks cause finite energy resources to be drained, legitimate reports to be dropped, and data to be intercepted by adversary nodes. A probabilistic voting-based filtering scheme (PVFS) and(More)