|
| | | |
Securing WSN update from Intrusion using Time Signature of Over the Air Update Protocol
Alam, A.S.M.A. and Eyers, D.
While over the air (OTA) software updates makes certain WSN management tasks easy, they are vulnerable to intrusion attempts. An adversary can take advantage of the resource-constrained nature of the sensor motes to break through the limited protection the sensors have. To deal with this problem, we have suggested a passive security mechanism - an IDS that works on a timing analysis principle. |
Cite as: Alam, A.S.M.A. and Eyers, D. (2015). Securing WSN update from Intrusion using Time Signature of Over the Air Update Protocol. In Proc. 13th Australasian Symposium on Parallel and Distributed Computing (AusPDC 2015) Sydney, Australia. CRPIT, 163. Javadi, B. and Garg, S.K. Eds., ACS. 107-110 |
(from crpit.com)
(local if available)
|
|