Beruflich Dokumente
Kultur Dokumente
ID in MANET - attacks
Routing logic
compromise blackhole, routing
update storm,
fabrication,
Traffic Distortion dropping, coruption,
flooding
Others - rushing,
wormhole, spoofing
ID in WSN
Secure Localization
GPS not feasible
Utilization of beacon packets and beacon nodes
Du et al - utilize deployment knowledge to
confirm beacon integrity
Liu et al - filter out malicious location references
using
Mean square error
Compute inconsistency
Voting based location estimation
Secure Aggregation
Wagner - robust statistics for resilient aggregation,
truncation, trimming
Yang - Secure Hop by Hop Aggregation Protocol
(SDAP)
Divide and conquer
Commit and attest
Grubbs test
Buttyan - RANSAC paradigm for resilient aggregation.
maximum likehood estimation
Questions ???