1 Citation (Scopus)
54 Downloads (Pure)


Wireless Sensor Networks are often distributed, diverse, and large making their monitoring and anomaly localisation hard. Anomaly may pertain to parts of topology unknown in the ground truth. It is advantageous to localise anomaly, ideally using data at the edge which helps to implement countermeasures such as threat containment and attacker localisation. In this manuscript a method allowing localisation of sensors with malicious topology change and ground truth acquisition is presented. A simulated wireless sensor network is used to acquire data at the edge and apply the method. We demonstrate detection of malicious topology change based on topology distance measure and localisation of sensors impacted by the change using the data available at the edge of WSN.
Original languageEnglish
Title of host publication2022 11th Mediterranean Conference on Embedded Computing, MECO 2022
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
ISBN (Electronic)978-1-6654-6828-2
ISBN (Print)978-1-6654-6829-9
Publication statusPublished - 21 Jun 2022
EventMediterranean Conference on Embedded Computing: Cyber-Physical Systems and Internet-of-Things - Budva, Montenegro
Duration: 7 Jun 202210 Jun 2022

Publication series

NameMediterranean Conference on Embedded Computing (MECO)
ISSN (Print)2377-5475
ISSN (Electronic)2637-9511


ConferenceMediterranean Conference on Embedded Computing
Abbreviated titleMECO CPSIoT
Internet address

Bibliographical note

Publisher Copyright:
© 2022 IEEE.


  • Localisation
  • Topology change
  • Anomaly detection
  • Sensor networks
  • Graph
  • Cyber-security


Dive into the research topics of 'Topology Change Localisation in WSNs'. Together they form a unique fingerprint.

Cite this