Insider Attacker Detection in Wireless Sensor Networks

Though destructive to network functions, insider attackers are not detectable with only the classic cryptography-based techniques. Many mission-critic sensor network applications demand an effective, light, flexible algorithm for internal adversary identification with only localized information available. The insider attacker detection scheme proposed in… CONTINUE READING

4 Figures & Tables



Citations per Year

192 Citations

Semantic Scholar estimates that this publication has 192 citations based on the available data.

See our FAQ for additional information.