Insider Attacker Detection in Wireless Sensor Networks

Though destructive to network functions, insider attackers are not detectable with only the classic cryptography-based techniques. Many mission-critic sensor network applications demand an effective, light, flexible algorithm for internal adversary identification with only localized information available. The insider attacker detection scheme proposed in… CONTINUE READING

4 Figures & Tables

Topics

Statistics

010203020082009201020112012201320142015201620172018
Citations per Year

192 Citations

Semantic Scholar estimates that this publication has 192 citations based on the available data.

See our FAQ for additional information.