S Alper Sert Adnan Yazici and Ahmet Cosar Impacts of Routing Attacks on Surveillance Wireless Sensor Networks IWCMC 2015 Dubrovnik Croatia 24 28 August 2015

2015-06-24
Seyyit Alper, Sert
Yazıcı, Adnan
Coşar, Ahmet
Surveillance Wireless Sensor Networks (SWSNs) are the result of abundant data gathering requirements occurring in Wireless Sensor Networks, specifically for surveillance reasons. Most SWSNs operate by sensing the environment and transmitting the acquired data to a sink in order to utilize it for decision making processes such as object detection, classification, localization, or event detection. In this respect, secure routing of acquired data is crucial since a decision making process is performed according to the received data. Although there are various other attack types targeting different layers of the protocol stack, in this study we primarily focus on routing attacks occurring in the network layer, highlight possible defense mechanisms with respect to each attack type, and present impacts of routing attacks on SWSNs
IWCMC-2015, 24 - 28 Ağustos 2015

Suggestions

Impacts of Routing Attacks on Surveillance Wireless Sensor Networks
Sert, Seyyit Alper; Yazıcı, Adnan; Coşar, Ahmet (2015-08-25)
Surveillance Wireless Sensor Networks (SWSNs) are the result of abundant data gathering requirements occurring in Wireless Sensor Networks, specifically for surveillance reasons. Most SWSNs operate by sensing the environment and transmitting the acquired data to a sink in order to utilize it for decision making processes such as object detection, classification, localization, or event detection. In this respect, secure routing of acquired data is crucial since a decision making process is performed accordin...
Analysis and modeling of routing and security problems in wireless sensor networks with mathematical programming
İncebacak, Davut; Baykal, Nazife; Bıçakcı, Kemal; Department of Information Systems (2013)
Wireless Sensor Networks (WSNs) are composed of battery powered small sensor nodes with limited processing, memory and energy resources. Self organization property together with infrastructureless characteristics of WSNs make them favorable solutions for many applications. Algorithms and protocols developed for WSNs must consider the characteristics and constraints of WSNs but since battery replenishment is not possible or highly challenging for sensor nodes, one of the major concerns in designing network p...
Finding sensing coverage and breach paths in wireless sensor networks
Onur, Ertan; Delic, H (2004-01-01)
Most of the recent studies on wireless sensor networks deal with the communication coverage. However, for the surveillance wireless sensor networks, sensing coverage is an open research area. In this paper, the sensing coverage area of surveillance wireless sensor networks is studied. The sensing coverage is determined by applying Neyman-Pearson Detection Model and Dijkstra's shortest path algorithm is applied to find the weakest breach path. Although individually not enough, breach probability is an approp...
An Adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks
Deniz, Fatih; Yazıcı, Adnan; Bağcı, Hakkı; Department of Computer Engineering (2016)
Wireless sensor networks (WSNs) are being used in numerous fields, such as battlefield surveillance, environmental monitoring and traffic control. They are typically composed of large numbers of tiny sensor nodes with limited resources. Because of their limitations and because of the environments they are being used, there are problems unique to WSNs. Due to the error-prone nature of wireless communication, especially in harsh environments, fault-tolerance emerges as an important property in WSNs. Also, bec...
Surveillance wireless sensor networks: Deployment quality analysis
Onur, Ertan; Delic, Hakan; Akarun, Lale (2007-11-01)
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of deployment can be determined sufficiently by analysis in advance of deployment. However, when random deployment is required, determining the deployment quality becomes challenging. To assess the quality of sensor deployment, appropriate measures can be employed that reveal the weaknesses in the coverage of SWSNs with respect to the suc...
Citation Formats
S. Seyyit Alper, A. Yazıcı, and A. Coşar, “S Alper Sert Adnan Yazici and Ahmet Cosar Impacts of Routing Attacks on Surveillance Wireless Sensor Networks IWCMC 2015 Dubrovnik Croatia 24 28 August 2015,” Dubrovnik, Hırvatistan, 2015, p. 910, Accessed: 00, 2021. [Online]. Available: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7289204.