In sensor networks, nodes can be easily compromised by an adversary because of hostile environments. An adversary may use compromised nodes to inject false reports into the network. The dynamic en-route scheme for filtering false data injection can detect and drop such false reports during the forwarding phase. In this scheme, choosing a threshold value is important, as it trades off between security power and energy consumption. Thus, we should choose the threshold value such that it provides sufficient resilience, yet be small enough to conserve energy. This paper presents a fuzzy-based threshold determining method for the dynamic en-route scheme for filtering false data injection in wireless sensor networks. The base station periodically...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injec...
Today, security is becoming more important as more WSN applications are developed. In a sensor netwo...
Abstract — Nodes in sensor networks can be easily compromised by an adversary due to hostile environ...
Many sensor network applications are dependent on the secure operation of networks, and serious prob...
Sensor nodes may be easily compromised and seized by adversaries, because they are disseminated in h...
In many sensor network applications, sensor nodes are deployed in open environments, and hence are v...
Wireless sensor networks are comprised of sensor nodes with resource-constrained hardware. Nodes in ...
Today, wireless sensor networks (WSNs) are applied to various industries such as building automation...
Energy management of WSN is one of the major issues. Many kind of attacks in WSN paralyze the networ...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injec...
Today, security is becoming more important as more WSN applications are developed. In a sensor netwo...
Abstract — Nodes in sensor networks can be easily compromised by an adversary due to hostile environ...
Many sensor network applications are dependent on the secure operation of networks, and serious prob...
Sensor nodes may be easily compromised and seized by adversaries, because they are disseminated in h...
In many sensor network applications, sensor nodes are deployed in open environments, and hence are v...
Wireless sensor networks are comprised of sensor nodes with resource-constrained hardware. Nodes in ...
Today, wireless sensor networks (WSNs) are applied to various industries such as building automation...
Energy management of WSN is one of the major issues. Many kind of attacks in WSN paralyze the networ...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injec...
Today, security is becoming more important as more WSN applications are developed. In a sensor netwo...