A Novel Vulnerability Detection Method for ZigBee MAC Layer

Author(s):  
Hui Li ◽  
Weishi Zhang ◽  
Weifu Zhou ◽  
Bo Su
2013 ◽  
Vol 4 (2/3) ◽  
pp. 134 ◽  
Author(s):  
Siwei Peng ◽  
Baojiang Cui ◽  
Ru Jia ◽  
Shurui Liang ◽  
Yiying Zhang

Author(s):  
Ambika N.

Sensors are tiny devices deployed to monitor any object of interest. As these devices are unsupervised, they are liable to get compromised. The chapter suggests to minimize sinkhole attack in the network. The work is an improvement of the cross-layer detection method. The doings of the network and MAC layer are brought in together to enhance security in the network. The proposed study uses signal strength and node identification to track the malicious node in the network. The work suffixes a hash code to enhance security in the network. The work aids in bringing forward secrecy. The energy is reduced by 18.18%, and the security is increased by 22% with the comparison to the previous work.


2013 ◽  
Vol 347-350 ◽  
pp. 3715-3720
Author(s):  
Bei Hai Liang ◽  
Bin Bin Qu ◽  
Sheng Jiang ◽  
Chu Tian Ye

At present, Cross Site Scripting (XSS) vulnerability exists in most web sites. The main reason is the lack of effective validation and filtering mechanisms for user input data from web request. This paper explores vulnerability detection method which based on taint dependence analysis and implements a prototype system for Java Web program. We treat all user input as tainted data, and track the flow of Web applications, then we judge whether it will trigger an attack or not. The taint dependent analysis algorithm mentioned in this paper is used to construct the taint dependency graph. Next the value representation method of the string tainted object based on finite state automata is discussed. Finally, we propose the vulnerability detection method for the program. The experiment result shows that the prototype system can detect reflection cross-site scripting vulnerability well in those programs which dont have effective treatment for the user input data.


Sign in / Sign up

Export Citation Format

Share Document