1 Citation (Scopus)
54 Downloads (Pure)

Abstract

Wireless Sensor Networks are often distributed, diverse, and large making their monitoring and anomaly localisation hard. Anomaly may pertain to parts of topology unknown in the ground truth. It is advantageous to localise anomaly, ideally using data at the edge which helps to implement countermeasures such as threat containment and attacker localisation. In this manuscript a method allowing localisation of sensors with malicious topology change and ground truth acquisition is presented. A simulated wireless sensor network is used to acquire data at the edge and apply the method. We demonstrate detection of malicious topology change based on topology distance measure and localisation of sensors impacted by the change using the data available at the edge of WSN.
Original languageEnglish
Title of host publication2022 11th Mediterranean Conference on Embedded Computing, MECO 2022
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
ISBN (Electronic)978-1-6654-6828-2
ISBN (Print)978-1-6654-6829-9
DOIs
Publication statusPublished - 21 Jun 2022
EventMediterranean Conference on Embedded Computing: Cyber-Physical Systems and Internet-of-Things - Budva, Montenegro
Duration: 7 Jun 202210 Jun 2022
https://mecoconference.me/cpsiot2022/

Publication series

NameMediterranean Conference on Embedded Computing (MECO)
PublisherIEEE
ISSN (Print)2377-5475
ISSN (Electronic)2637-9511

Conference

ConferenceMediterranean Conference on Embedded Computing
Abbreviated titleMECO CPSIoT
Country/TerritoryMontenegro
CityBudva
Period7/06/2210/06/22
Internet address

Bibliographical note

Publisher Copyright:
© 2022 IEEE.

Keywords

  • Localisation
  • Topology change
  • Anomaly detection
  • Sensor networks
  • Graph
  • Cyber-security

Fingerprint

Dive into the research topics of 'Topology Change Localisation in WSNs'. Together they form a unique fingerprint.

Cite this