Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target region. These networks are vulnerable to security breach due to wireless communication and lack of infrastructure. In sinkhole attacks, an attacker attracts network traffic by forging or replaying routing messages through compromised nodes. Thus attracted traffic is used for selective forwarding, denial of service (DoS) and false report attacks. In this paper, we show the vulnerability of the directed diffusion routing protocol to sinkhole attacks. And we also propose the intrusion detection scheme using fuzzy logic for detecting and defending sinkhole attacks in directed diffusion based sensor networks. Key words: Wireless sensor networks, si...
In sensor networks, nodes can be easily compromised by an adversary because of hostile environments....
Wireless Sensor Networks (WSNs) have collection of sensor nodes to collect information about the sur...
The widespread usage of Wireless sensor networks in various fields and application make it vulnerabl...
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. Th...
Abstract — Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide rang...
Abstract-This paper investigates one of the most severe routing attacks in sensor networks, namely s...
Abstract — In this paper, we propose a detection scheme for sinkhole attacks in wireless sensor netw...
Wireless sensor networks (WSN’s) comprise limited energy small sensor nodes having the ability to mo...
Recently, wireless sensor networks (WSNs) have been widely used in many applications, such as Smart ...
International audienceThis work introduces two new cryptographic protocols of different complexity a...
Abstract. Sensors in a wireless sensor network depend on their neigh-bours to route their messages. ...
International audienceThis work focuses on: (1) understanding the impact of selective forwarding att...
Security is one of an important factor to be considered seriously in wireless sensor networks. In WS...
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly sus-ceptible to ...
Objectives: The main aim of this paper is security by applying Intelligent Intrusion detection Syste...
In sensor networks, nodes can be easily compromised by an adversary because of hostile environments....
Wireless Sensor Networks (WSNs) have collection of sensor nodes to collect information about the sur...
The widespread usage of Wireless sensor networks in various fields and application make it vulnerabl...
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. Th...
Abstract — Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide rang...
Abstract-This paper investigates one of the most severe routing attacks in sensor networks, namely s...
Abstract — In this paper, we propose a detection scheme for sinkhole attacks in wireless sensor netw...
Wireless sensor networks (WSN’s) comprise limited energy small sensor nodes having the ability to mo...
Recently, wireless sensor networks (WSNs) have been widely used in many applications, such as Smart ...
International audienceThis work introduces two new cryptographic protocols of different complexity a...
Abstract. Sensors in a wireless sensor network depend on their neigh-bours to route their messages. ...
International audienceThis work focuses on: (1) understanding the impact of selective forwarding att...
Security is one of an important factor to be considered seriously in wireless sensor networks. In WS...
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly sus-ceptible to ...
Objectives: The main aim of this paper is security by applying Intelligent Intrusion detection Syste...
In sensor networks, nodes can be easily compromised by an adversary because of hostile environments....
Wireless Sensor Networks (WSNs) have collection of sensor nodes to collect information about the sur...
The widespread usage of Wireless sensor networks in various fields and application make it vulnerabl...