Many sensor network applications are dependent on the secure operation of sensor networks, and will have serious consequences if the network is compromised or disrupted. Fabricated reports can be injected through compromised nodes, which can lead not only to false alarms but also to the depletion of limited energy resources in battery powered networks. Ye et al. proposed the statistical en-route filtering scheme to detect and drop such fabricated reports during the forwarding process. In this scheme, every node has a limited amount of information that is used to verify against injected false data, the detection power is affected by the selection of routing paths. In this paper, we propose a path selection method to improve the detection pow...
Abstract — Node compromise is a serious threat in wireless sensor networks. An adversary can use com...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
In many sensor network applications, sensor nodes are deployed in open environments, and hence are v...
Abstract- Sensor nodes may be deployed in hostile environments. An adversary may compromise the sens...
Wireless sensor networks consist of a large number of small sensor nodes having limited computation ...
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injec...
Abstract — Nodes in sensor networks can be easily compromised by an adversary due to hostile environ...
tackers could inject false measurements to the controller through compromised sensor nodes, which no...
Wireless sensor networks (WSN) collect and report event information to users in many applications (e...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...
In sensor networks, nodes can be easily compromised by an adversary because of hostile environments....
Many sensor network applications are dependent on the secure operation of networks, and serious prob...
[[abstract]]Compromised nodes could launch several attacks in wireless sensor network. The easiest w...
In wireless sensor networks, adversaries compromise sensor nodes to damage the network though potent...
Abstract — Node compromise is a serious threat in wireless sensor networks. An adversary can use com...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
In many sensor network applications, sensor nodes are deployed in open environments, and hence are v...
Abstract- Sensor nodes may be deployed in hostile environments. An adversary may compromise the sens...
Wireless sensor networks consist of a large number of small sensor nodes having limited computation ...
Sensor nodes are easily compromised to malicious attackers due to an open environment. A false injec...
Abstract — Nodes in sensor networks can be easily compromised by an adversary due to hostile environ...
tackers could inject false measurements to the controller through compromised sensor nodes, which no...
Wireless sensor networks (WSN) collect and report event information to users in many applications (e...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...
In sensor networks, nodes can be easily compromised by an adversary because of hostile environments....
Many sensor network applications are dependent on the secure operation of networks, and serious prob...
[[abstract]]Compromised nodes could launch several attacks in wireless sensor network. The easiest w...
In wireless sensor networks, adversaries compromise sensor nodes to damage the network though potent...
Abstract — Node compromise is a serious threat in wireless sensor networks. An adversary can use com...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...