dc.contributor.author | Stavrou, Eliana | en |
dc.contributor.author | Pitsillides, Andreas | en |
dc.creator | Stavrou, Eliana | en |
dc.creator | Pitsillides, Andreas | en |
dc.date.accessioned | 2019-11-13T10:42:23Z | |
dc.date.available | 2019-11-13T10:42:23Z | |
dc.date.issued | 2011 | |
dc.identifier.isbn | 978-1-4577-0024-8 | |
dc.identifier.uri | http://gnosis.library.ucy.ac.cy/handle/7/55026 | |
dc.description.abstract | Security is an important property in applications offering services in mission-critical areas, such as in healthcare, military, transportation, etc. Wireless sensor networks (WSN) support the mission of these applications by monitoring the environment and reporting observations to appropriate authorities that are responsible for decision-making. Often, their operation can be at risk by adversaries that launch attacks against the WSN with the aim of compromising the reliability and availability of the network and the respective application. The outcome of an attack highly depends on the experience of the adversary and his capabilities in terms of programming skills, security knowledge and resources. From the network perspective, the challenge is to reliably recover to a normal operation as soon as the adversary is been detected and allow for packet delivery to destination. The challenge is even greater in the presence of adversaries that adapt their intrusion strategy to break the deployed recovery countermeasures and continue affecting the network. Proposed recovery countermeasures typically assume the use of omni-directional antennas, which cannot take advantage of antenna directivity in order to manipulate communication paths between WSN nodes for the purpose of (physically) bypassing an adversary. This paper presents an intrusion recovery protocol in WSNs that uses directional antennas to create controlled communication paths, thus routing, and enhancing the reliability, self-healingness and resilience of the network. The proposed protocol is implemented within the AODV context and evaluated using ns-2. We demonstrate the effectiveness of the proposed protocol to deliver packets to the destination in the presence of multiple persistent adversaries that deploy different types of simple to extended attacks. © 2011 IEEE. | en |
dc.source | 2011 18th International Conference on Telecommunications, ICT 2011 | en |
dc.source | 2011 18th International Conference on Telecommunications, ICT 2011 | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960897440&doi=10.1109%2fCTS.2011.5898964&partnerID=40&md5=d83c0ecc6d6f7d816157f2a65872a4af | |
dc.subject | Information technology | en |
dc.subject | Decision making | en |
dc.subject | Directional patterns (antenna) | en |
dc.subject | Directive antennas | en |
dc.subject | Wireless networks | en |
dc.subject | Sensors | en |
dc.subject | Sensor nodes | en |
dc.subject | Telecommunication | en |
dc.subject | Computer system recovery | en |
dc.subject | Military applications | en |
dc.subject | Normal operations | en |
dc.subject | Routing protocols | en |
dc.subject | Health care | en |
dc.subject | recovery | en |
dc.subject | Directional Antenna | en |
dc.subject | directional antennas | en |
dc.subject | Intrusion recovery | en |
dc.subject | WSN security | en |
dc.subject | Antenna directivity | en |
dc.subject | Communication path | en |
dc.subject | Omni-directional antenna | en |
dc.subject | Packet Delivery | en |
dc.subject | Programming skills | en |
dc.subject | Reliability and availability | en |
dc.subject | secure routing | en |
dc.title | Combating persistent adversaries in wireless sensor networks using directional antennas | en |
dc.type | info:eu-repo/semantics/conferenceObject | |
dc.identifier.doi | 10.1109/CTS.2011.5898964 | |
dc.description.startingpage | 433 | |
dc.description.endingpage | 438 | |
dc.author.faculty | 002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences | |
dc.author.department | Τμήμα Πληροφορικής / Department of Computer Science | |
dc.type.uhtype | Conference Object | en |
dc.description.notes | <p>Sponsors: IBM Cyprus | en |
dc.description.notes | University of Cyprus | en |
dc.description.notes | Cyprus Tourism Organisation | en |
dc.description.notes | Conference code: 85747 | en |
dc.description.notes | Cited By :3</p> | en |
dc.contributor.orcid | Pitsillides, Andreas [0000-0001-5072-2851] | |
dc.gnosis.orcid | 0000-0001-5072-2851 | |