Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Electrical and Computer Engineering Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Electrical and Computer Engineering
Interleaved Honeypot-Framing Model With Secure Mac Policies For Wireless Sensor Networks, Rajasoundaran Soundararajan, Maheswar Rajagopal, Akila Muthuramalingam, Eklas Hossain, Jaime Lloret
Interleaved Honeypot-Framing Model With Secure Mac Policies For Wireless Sensor Networks, Rajasoundaran Soundararajan, Maheswar Rajagopal, Akila Muthuramalingam, Eklas Hossain, Jaime Lloret
Electrical and Computer Engineering Faculty Publications and Presentations
The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies provide expected and predictable practices against channel attackers. These security policies can be easily breached by any intelligent attacks or malicious actions. The proposed Wireless Interleaved Honeypot-Framing Model (WIHFM) newly implements distributed honeypot-based security mechanisms in each sensor node to act reactively against various attackers. The proposed WIHFM creates an …
Cyber-Physical Security Assessment And Resilience Of A Microgrid Testbed, Said Ahmed-Zaid, Sin Ming Loo, Andres Valdepena-Delgado, Theron Beam
Cyber-Physical Security Assessment And Resilience Of A Microgrid Testbed, Said Ahmed-Zaid, Sin Ming Loo, Andres Valdepena-Delgado, Theron Beam
Electrical and Computer Engineering Faculty Publications and Presentations
In order to identify potential weakness in communication and data in transit, a microgrid testbed is being developed at Boise State University. This testbed will be used to verify microgrid models and communication methods in an effort to increase the resiliency of these systems to cyber-attacks. If vulnerabilities are found in these communication methods, then risk mitigation techniques will be developed to address them.