Sensor networks are special types of ad-hoc wireless networks. They are generally used to collect some field data from a given region. The nodes have limited computing capabilities, reduced size and significant power constraints. Therefore extending the lifetime of these nodes is of primary importance. LEACH and PEGASIS are two well-known power-aware routing schemes for sensor networks. These protocols are susceptible to various forms of denial of service attacks due to vulnerabilities highlighted in the paper. The vulnerabilities in the protocols exist at various layers of the protocol stack. The paper presents an analysis of these vulnerabilities and proposes mitigation strategies to alleviate the consequences of such attacks. Additionall...
Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS...
The consequence of Vampire attacks on link-state, distance-vector, source routing and geographic and...
International audienceThis work focuses on: (1) understanding the impact of selective forwarding att...
Abstract — Network survivability is the capacity of a network keeping connected under loss and intru...
We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintena...
Abstract-- Wireless ad-hoc sensor networks has become crucial for everyday functioning of people and...
In this paper, the security vulnerabilities of topology maintenance protocols namely PEAS, CCP which...
A sensor network consists of thousands of low-power, low-cost sensor nodes with limited computation,...
We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintena...
Wireless sensor networks (WSN) are highly vulnerable to attacks and constraints on resources like po...
We analyze the security vulnerabilities of some well-known topology maintenance protocols (TMPs) for...
We analyze the security vulnerabilities of PEAS, AS-CENT, and CCP, three well-known topology mainten...
Abstract- Wireless ad-hoc sensor networks and routing data in them is a significant research area. T...
In this paper, we investigate security issues and challenges facing researchers in wireless sensor n...
Wireless Sensor Networks (WSNs) have attracted considerable research attention in recent years becau...
Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS...
The consequence of Vampire attacks on link-state, distance-vector, source routing and geographic and...
International audienceThis work focuses on: (1) understanding the impact of selective forwarding att...
Abstract — Network survivability is the capacity of a network keeping connected under loss and intru...
We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintena...
Abstract-- Wireless ad-hoc sensor networks has become crucial for everyday functioning of people and...
In this paper, the security vulnerabilities of topology maintenance protocols namely PEAS, CCP which...
A sensor network consists of thousands of low-power, low-cost sensor nodes with limited computation,...
We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintena...
Wireless sensor networks (WSN) are highly vulnerable to attacks and constraints on resources like po...
We analyze the security vulnerabilities of some well-known topology maintenance protocols (TMPs) for...
We analyze the security vulnerabilities of PEAS, AS-CENT, and CCP, three well-known topology mainten...
Abstract- Wireless ad-hoc sensor networks and routing data in them is a significant research area. T...
In this paper, we investigate security issues and challenges facing researchers in wireless sensor n...
Wireless Sensor Networks (WSNs) have attracted considerable research attention in recent years becau...
Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS...
The consequence of Vampire attacks on link-state, distance-vector, source routing and geographic and...
International audienceThis work focuses on: (1) understanding the impact of selective forwarding att...