Sensor nodes may be easily compromised and seized by adversaries, because they are disseminated in hostile environments. Adversaries may try various security attacks on sensor networks using compromised nodes. False data injection attacks using nodes may cause false alarms, and severe energy waste. The dynamic en-route filtering scheme (DEF) can detect and drop false data during the forwarding process. In DEF, each forwarding node verifies data with a certain probability. In terms of energy conservation, this approach is efficient against false traffic, but not against legitimate traffic. In this paper, we propose a fuzzy-based verification-probability determination method for DEF. A forwarding node verifies data with some probability that ...
Today, wireless sensor networks (WSNs) are applied to various industries such as building automation...
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injec...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
In sensor networks, nodes can be easily compromised by an adversary because of hostile environments....
Abstract — Nodes in sensor networks can be easily compromised by an adversary due to hostile environ...
Wireless sensor networks are comprised of sensor nodes with resource-constrained hardware. Nodes in ...
Many sensor network applications are dependent on the secure operation of networks, and serious prob...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...
In many sensor network applications, sensor nodes are deployed in open environments, and hence are v...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks (WSN) collect and report event information to users in many applications (e...
In wireless sensor networks, sensor nodes are easily compromised due to their restricted hardware re...
In many wireless sensor network applications, sensor nodes that have a limited battery power are dep...
Today, wireless sensor networks (WSNs) are applied to various industries such as building automation...
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injec...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
In sensor networks, nodes can be easily compromised by an adversary because of hostile environments....
Abstract — Nodes in sensor networks can be easily compromised by an adversary due to hostile environ...
Wireless sensor networks are comprised of sensor nodes with resource-constrained hardware. Nodes in ...
Many sensor network applications are dependent on the secure operation of networks, and serious prob...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...
In many sensor network applications, sensor nodes are deployed in open environments, and hence are v...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks (WSN) collect and report event information to users in many applications (e...
In wireless sensor networks, sensor nodes are easily compromised due to their restricted hardware re...
In many wireless sensor network applications, sensor nodes that have a limited battery power are dep...
Today, wireless sensor networks (WSNs) are applied to various industries such as building automation...
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injec...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...