Show simple item record

dc.contributor.authorStavrou, Elianaen
dc.contributor.authorPitsillides, Andreasen
dc.creatorStavrou, Elianaen
dc.creatorPitsillides, Andreasen
dc.date.accessioned2019-11-13T10:42:23Z
dc.date.available2019-11-13T10:42:23Z
dc.date.issued2016
dc.identifier.isbn978-1-5090-1990-8
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/55022
dc.description.abstractWireless Sensor Networks (WSNs) are utilized in a number of critical infrastructures, e.g. healthcare, disaster and relief. In sensitive environments, it is vital to maintain the operability of the network in an effort to support the decision-making process that depends on the sensors' observations. The network's operability can be maintained if observations can reach the specified destination and also if the sensors have adequate energy resources. The operability is negatively affected by security attacks, such as the selective forward and the denial of service (DoS), that can be executed against the WSN. The attacks' impact greatly depends on the attackers' capabilities such as their knowledge and the number of malicious nodes they hold. Currently, the research community focuses on addressing casual attackers that don't persist with their attack strategy. However, the proposed solutions cannot address persistent attackers that continue with their attack execution after the network has applied appropriate recovery countermeasures. Designing an adaptive recovery strategy is challenging as a number of issues need to be taken into consideration such as the network's density, the number of malicious nodes and the persistent attack strategy. This research work formulates a persistent attack strategy and investigates the integration of different recovery countermeasures in WSNs. The evaluation results demonstrate that an adaptive recovery strategy can enhance the network's recovery benefits, in terms of increased packet delivery and decreased energy consumption, and prolong its operability. Moreover, the observations made are envisioned to encourage new contributions in the area of adaptive intrusion recovery in WSNs. © 2016 IEEE.en
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en
dc.source2016 23rd International Conference on Telecommunications, ICT 2016en
dc.source23rd International Conference on Telecommunications, ICT 2016en
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84979279949&doi=10.1109%2fICT.2016.7500448&partnerID=40&md5=2aac0779c9189a2eecdbcc23d7ebee87
dc.subjectDecision makingen
dc.subjectEnergy resourcesen
dc.subjectSensor nodesen
dc.subjectWireless sensor networksen
dc.subjectComputer system recoveryen
dc.subjectDenial-of-service attacken
dc.subjectEnergy utilizationen
dc.subjectrecoveryen
dc.subjectadaptabilityen
dc.subjectintrusion recoveryen
dc.subjectMercury (metal)en
dc.subjectpersistent adversaryen
dc.subjectresilienceen
dc.subjectsurvivabilityen
dc.subjectWSNen
dc.titleWSN operability during persistent attack executionen
dc.typeinfo:eu-repo/semantics/conferenceObject
dc.identifier.doi10.1109/ICT.2016.7500448
dc.author.faculty002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences
dc.author.departmentΤμήμα Πληροφορικής / Department of Computer Science
dc.type.uhtypeConference Objecten
dc.description.notes<p>Sponsors:en
dc.description.notesConference code: 122441en
dc.description.notesCited By :1</p>en
dc.contributor.orcidPitsillides, Andreas [0000-0001-5072-2851]
dc.gnosis.orcid0000-0001-5072-2851


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record