Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Securing WSN update from Intrusion using Time Signature of Over the Air Update Protocol

Alam, A.S.M.A. and Eyers, D.

    While over the air (OTA) software updates makes certain WSN management tasks easy, they are vulnerable to intrusion attempts. An adversary can take advantage of the resource-constrained nature of the sensor motes to break through the limited protection the sensors have. To deal with this problem, we have suggested a passive security mechanism - an IDS that works on a timing analysis principle.
Cite as: Alam, A.S.M.A. and Eyers, D. (2015). Securing WSN update from Intrusion using Time Signature of Over the Air Update Protocol. In Proc. 13th Australasian Symposium on Parallel and Distributed Computing (AusPDC 2015) Sydney, Australia. CRPIT, 163. Javadi, B. and Garg, S.K. Eds., ACS. 107-110
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS