Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks release_qvjzf2s5hvb2vc7feffnku2sxi

by Sunil Gupta, Harsh Verma, A Sangal

Entity Metadata (schema)

abstracts[] {'sha1': 'a4900c97f5756d7263ce8286330ac7b0a86ae30f', 'content': 'Wireless Sensor Networks (WSN) consist of tiny devices called sensor nodes with RF radio, processor, memory, battery and sensor hardware. Individual can specifically monitor the environment with widespread deployment of these devices. Sensor nodes are resource constrained in terms of the RF radio range, processor speed, memory size and power. WSNs are mostly unguarded. Hence capturing a node physically, altering its code and getting private information like cryptographic keys is easily possible for an attacker. Wireless medium is inherently broadcast in nature. This makes them vulnerable to attacks. These attacks can disrupt the operation of WSN and can even defeat the purpose of their deployment. In this paper, we study techniques and examine their performance in terms of successful masquerade detection rate, traffic and computational overhead. Index Terms-masquerade detection, Sensor networks, security and Protection.', 'mimetype': 'text/plain', 'lang': None}
contribs[] {'index': 0, 'creator_id': None, 'creator': None, 'raw_name': 'Sunil Gupta', 'given_name': None, 'surname': None, 'role': 'author', 'raw_affiliation': None, 'extra': None}
{'index': 1, 'creator_id': None, 'creator': None, 'raw_name': 'Harsh Verma', 'given_name': None, 'surname': None, 'role': 'author', 'raw_affiliation': None, 'extra': None}
{'index': 2, 'creator_id': None, 'creator': None, 'raw_name': 'A Sangal', 'given_name': None, 'surname': None, 'role': 'author', 'raw_affiliation': None, 'extra': None}
ext_ids {'doi': None, 'wikidata_qid': None, 'isbn13': None, 'pmid': None, 'pmcid': None, 'core': None, 'arxiv': None, 'jstor': None, 'ark': None, 'mag': None, 'doaj': None, 'dblp': None, 'oai': None, 'hdl': None}
files[] {'state': 'active', 'ident': '5sze6gd7wfd35eosiqgbmsyqh4', 'revision': '10b5d9d0-065e-4a0d-9b1f-1bb880ac7ad7', 'redirect': None, 'extra': None, 'edit_extra': None, 'size': 501340, 'md5': '15a2a386a0e741dbabda402d0645adb0', 'sha1': '2238d6bbd121afe291afd5b5c3b2bda2eb908fec', 'sha256': '4d2753eeba48acb020b6dfa2e3dbf35980c0d351903cfb5135cc1392ec7d9c11', 'urls': [{'url': '', 'rel': 'webarchive'}, {'url': '', 'rel': 'web'}], 'mimetype': 'application/pdf', 'content_scope': None, 'release_ids': ['qvjzf2s5hvb2vc7feffnku2sxi'], 'releases': None}
filesets []
refs[] {'index': 0, 'target_release_id': None, 'extra': {'authors': ['R Maxion', 'T Townsend']}, 'key': 'b0', 'year': 2002, 'container_name': None, 'title': 'Masquerade detection using truncated command lines', 'locator': None}
{'index': 1, 'target_release_id': None, 'extra': {'authors': ['Boleslaw Szymanski', 'Yongqiang Zhang']}, 'key': 'b1', 'year': 2004, 'container_name': None, 'title': 'Recursive Data Mining for Masquerade Detection and Author Identification', 'locator': None}
{'index': 2, 'target_release_id': None, 'extra': {'authors': ['Phillip Porras', 'Richard Kemmerer']}, 'key': 'b2', 'year': 1992, 'container_name': None, 'title': 'Penetration State Transition Analysis: A Rule-Based Intrusion Detection Approach', 'locator': None}
{'index': 3, 'target_release_id': None, 'extra': {'authors': ['Sandeep Kumar', 'Eugene Spafford']}, 'key': 'b3', 'year': 1994, 'container_name': None, 'title': 'A Pattern Matching Model for Misuse Intrusion Detection', 'locator': None}
{'index': 4, 'target_release_id': None, 'extra': {'authors': ['Giovanni Vigna', 'Richard Kemmerer']}, 'key': 'b4', 'year': 1998, 'container_name': None, 'title': 'NetSTAT: A NetworkBased Intrusion Detection Approach', 'locator': None}
{'index': 5, 'target_release_id': None, 'extra': None, 'key': 'b5', 'year': 1998, 'container_name': None, 'title': 'Annual Computer Security Applications Conference (ACSAC)', 'locator': None}
{'index': 6, 'target_release_id': None, 'extra': {'authors': ['C Ko', 'M Ruschitzka', 'K Levitt']}, 'key': 'b6', 'year': 1997, 'container_name': None, 'title': 'Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specificationbased Approach', 'locator': None}
{'index': 7, 'target_release_id': None, 'extra': {'authors': ['A Ghosh', 'J Wanken', 'F Charron']}, 'key': 'b7', 'year': 1998, 'container_name': None, 'title': 'Detecting Anomalous and Unknown Intrusions Against Programs', 'locator': None}
{'index': 8, 'target_release_id': None, 'extra': {'authors': ['David Endler']}, 'key': 'b8', 'year': 1998, 'container_name': None, 'title': 'Intrusion Detection Applying Machine Learning to Solaris Audit Data', 'locator': None}
{'index': 9, 'target_release_id': None, 'extra': {'authors': ['I Akyildiz', 'W Su', 'Y Sankarasubramaniam', 'E Cayirci'], 'volume': '38'}, 'key': 'b9', 'year': 2002, 'container_name': None, 'title': 'Wireless Sensor Networks: A Survey', 'locator': None}
{'index': 10, 'target_release_id': None, 'extra': {'authors': ['J Yick', 'B Mukherjee', 'D Ghosal'], 'issue': '12', 'volume': '52'}, 'key': 'b10', 'year': 2008, 'container_name': None, 'title': 'Wireless sensor network survey', 'locator': None}
{'index': 11, 'target_release_id': None, 'extra': {'authors': ['M Tubaishat', 'S Madria'], 'issue': None, 'volume': '22'}, 'key': 'b11', 'year': 2003, 'container_name': None, 'title': 'Sensor Networks: An Overview', 'locator': None}
{'index': 12, 'target_release_id': None, 'extra': {'authors': ['J Walters', 'Z Liang', 'W Shi', 'V Chaudhary'], 'volume': '17'}, 'key': 'b12', 'year': 2007, 'container_name': None, 'title': 'Wireless Sensor Network Security: A Survey', 'locator': None}
{'index': 13, 'target_release_id': None, 'extra': {'authors': ['C Karlof', 'D Wagner']}, 'key': 'b13', 'year': 2002, 'container_name': None, 'title': 'Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures', 'locator': None}
{'index': 14, 'target_release_id': None, 'extra': {'authors': ['X Chen', 'K Makki', 'K Yen', 'N Pissinou'], 'issue': None, 'volume': '11'}, 'key': 'b14', 'year': 2009, 'container_name': None, 'title': 'Sensor network security: A Survey', 'locator': None}
{'index': 15, 'target_release_id': None, 'extra': {'authors': ['D Boyle', 'T Newe']}, 'key': 'b15', 'year': 2007, 'container_name': None, 'title': 'Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures', 'locator': None}
{'index': 16, 'target_release_id': None, 'extra': {'authors': ['H Alwan', 'A Agarwal']}, 'key': 'b16', 'year': 2009, 'container_name': None, 'title': 'A Survey on Fault Tolerant Routing Techniques in Wireless Sensor Networks', 'locator': None}
{'index': 17, 'target_release_id': None, 'extra': {'authors': ['Y Wang', 'G Attebury', 'B Ramamurthy'], 'volume': None}, 'key': 'b17', 'year': 2006, 'container_name': None, 'title': 'A Survey of Security Issues in Wireless Sensor Networks', 'locator': None}
{'index': 18, 'target_release_id': None, 'extra': {'authors': ['D Mpitziopoulos', 'C Gavalas', 'G Konstantopoulos', 'Pantziou'], 'issue': None, 'volume': '11'}, 'key': 'b18', 'year': 2009, 'container_name': None, 'title': 'A Survey on Jamming Attacks and Countermeasures in WSNs', 'locator': None}
{'index': 19, 'target_release_id': None, 'extra': {'authors': ['R Schmid1', 'Wattenhofer']}, 'key': 'b19', 'year': 2006, 'container_name': None, 'title': 'Algorithmic Models for Sensor Networks', 'locator': None}
{'index': 20, 'target_release_id': None, 'extra': {'authors': ['P Von Rickenbach', 'R Wattenhofer', 'A Zollinger'], 'volume': '17'}, 'key': 'b20', 'year': 2009, 'container_name': None, 'title': 'Algorithmic Models of Interference in Wireless Ad Hoc and Sensor Networks', 'locator': None}
{'index': 21, 'target_release_id': None, 'extra': {'authors': ['S Dolev', 'S Gilbert', 'R Guerraoui', 'C Newport', 'F Kuhn', 'N Lynch', 'D Kowalski']}, 'key': 'b21', 'year': 2009, 'container_name': None, 'title': 'Reliable Distributed Computing on Unreliable Radio Channels (Extended Abstract)', 'locator': None}
{'index': 22, 'target_release_id': None, 'extra': None, 'key': 'b22', 'year': 2009, 'container_name': None, 'title': 'MobiHoc S3 Workshop on MobiHoc S3', 'locator': None}
{'index': 23, 'target_release_id': None, 'extra': {'authors': ['B Raman', 'K Chebrolu'], 'volume': '38'}, 'key': 'b23', 'year': 2008, 'container_name': None, 'title': 'Sensor Networks" from a Systems Perspective', 'locator': None}
{'index': 24, 'target_release_id': None, 'extra': {'authors': ['G Chockler', 'M Demirbas', 'S Gilbert', 'N Lynch', 'C Newport', 'T Nolte']}, 'key': 'b24', 'year': 2005, 'container_name': None, 'title': 'Reconciling the Theory and Practice of Unreliable Wireless Broadcast', 'locator': None}
{'index': 25, 'target_release_id': None, 'extra': {'authors': ['G Anastasi', 'A Falchi', 'A Passarella', 'M Conti', 'E Gregori']}, 'key': 'b25', 'year': 2004, 'container_name': None, 'title': 'Performance Measurements of Motes Sensor Networks', 'locator': None}
{'index': 26, 'target_release_id': None, 'extra': {'authors': ['J Polastre', 'R Szewczyk', 'D Culler']}, 'key': 'b26', 'year': 2005, 'container_name': None, 'title': 'Telos: Enabling UltraLow Power Wireless Research', 'locator': None}
{'index': 27, 'target_release_id': None, 'extra': {'authors': ['B Cody-Kenny', 'D Guerin', 'D Ennis', 'R Carbajo', 'M Huggard', 'C Goldrick']}, 'key': 'b27', 'year': 2009, 'container_name': None, 'title': 'Performance Evaluation of the 6LoWPAN Protocol on MICAz and TelosB Motes', 'locator': None}
{'index': 28, 'target_release_id': None, 'extra': {'authors': ['W Heinzelman', 'A Chandrakasan', 'H Balakrishnan']}, 'key': 'b28', 'year': 2000, 'container_name': None, 'title': 'Energy-Efficient Communication Protocol for Wireless Microsensor Networks', 'locator': None}
{'index': 29, 'target_release_id': None, 'extra': {'authors': ['S Kumar', 'V Raghavan', 'J Deng'], 'volume': None}, 'key': 'b29', 'year': 2006, 'container_name': None, 'title': 'Medium Access Control Protocols for Ad Hoc Wireless Networks: A Survey', 'locator': None}
{'index': 30, 'target_release_id': None, 'extra': {'authors': ['Y Li', 'W Ye', 'J Heidemann']}, 'key': 'b30', 'year': 2005, 'container_name': None, 'title': 'Energy and Latency Control in Low Duty Cycle MAC Protocols', 'locator': None}
{'index': 31, 'target_release_id': None, 'extra': {'authors': ['K Whitehouse', 'A Woo', 'F Jiang', 'J Polastre', 'D Culler']}, 'key': 'b31', 'year': 2005, 'container_name': None, 'title': 'Exploitingthe Capture Effect for Collision Detection and Recovery', 'locator': None}
{'index': 32, 'target_release_id': None, 'extra': {'authors': ['C Raman', 'Atul Negi']}, 'key': 'b32', 'year': 2005, 'container_name': None, 'title': 'A hybrid method to intrusion detection system using HMM', 'locator': None}
{'index': 33, 'target_release_id': None, 'extra': {'authors': ['I Brain C Davell Richard', 'A Davis', 'Terry Caelli']}, 'key': 'b33', 'year': None, 'container_name': None, 'title': 'Improved estimation of hidden Markov model parameters from mutiple observation sequences', 'locator': None}
release_type article-journal
release_year 2012
title Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks
webcaptures []
work_id wf7wwht57bhw3ll4rg5kprkaua

Extra Metadata (raw JSON)

container_name International Journal of Computer Technology and Electronics Engineering (IJCTEE
longtail_oa True