Fragkiadakis, A.G. and Askoxylakis, I., 2013. Malicious traffic analysis in wireless sensor networks using advanced signal processing techniques. In: 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), 4-7 June 2013, Madrid, Spain.
Full text available as:
|
PDF
wowmom_dspan13.pdf 272kB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1109/WoWMoM.2013.6583469
Abstract
The recent advances in micro-sensor hardware technologies, along with the invention of energy-efficient protocols, have enabled a world-wide spread in wireless sensor networks deployment. These networks are used for a large number of purposes, while having small maintenance and deployment costs. However, as these are usually unattended networks, several security threats have emerged. In this work, we show how an adversary can overhear the encrypted wireless transmissions, and detect the periodic components of the wireless traffic that can further reveal the application used in the sensor network. Traffic analysis is performed in a very energy-efficient way using the compressed sensing principles. Furthermore, the periodic components are detected using the Lomb-Scargle periodogram technique. © 2013 IEEE.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Group: | Faculty of Science & Technology |
ID Code: | 24628 |
Deposited By: | Symplectic RT2 |
Deposited On: | 26 Sep 2016 13:12 |
Last Modified: | 14 Mar 2022 13:58 |
Downloads
Downloads per month over past year
Repository Staff Only - |