Abstract-This paper investigates one of the most severe routing attacks in sensor networks, namely sinkhole attack. A compromised node tries to draw all or as much traffic as possible from a particular area, by making it look attractive to the surrounding nodes with respect to the underlying routing metric. The detection of sinkhole attack in wireless sensor networks is proposed using an enhanced double davis- mayer scheme that utilizes both SHA and MD5 algorithms for producing the digest of a message that is ready for transmission. The compromised nodes are identified by transmitting the message in two paths; one is advertised routing path and actual routing path. The digest transmitted in both the paths must be same if the network is not ...
Denial of Services (DoS) attacks has long been a problem in ad-hoc and wireless networks during data...
ABSTRACT Most research related to secure routing in sensor networks has focused on how to detect and...
The widespread usage of Wireless sensor networks in various fields and application make it vulnerabl...
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. Th...
Abstract — In this paper, we propose a detection scheme for sinkhole attacks in wireless sensor netw...
Abstract — Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide rang...
Wireless sensor networks (WSN’s) comprise limited energy small sensor nodes having the ability to mo...
Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target r...
Recently, wireless sensor networks (WSNs) have been widely used in many applications, such as Smart ...
With the continuous improvement of science and technology, wireless sensor network technology has gr...
AbstractWireless sensor networkshas a bright future because of its low-cost, save-power, and easy im...
International audienceThis work introduces two new cryptographic protocols of different complexity a...
International audienceThis work focuses on: (1) understanding the impact of selective forwarding att...
One of the most common attacks against Wireless Sensor Networks is the wormhole attack. In this atta...
Security is one of an important factor to be considered seriously in wireless sensor networks. In WS...
Denial of Services (DoS) attacks has long been a problem in ad-hoc and wireless networks during data...
ABSTRACT Most research related to secure routing in sensor networks has focused on how to detect and...
The widespread usage of Wireless sensor networks in various fields and application make it vulnerabl...
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. Th...
Abstract — In this paper, we propose a detection scheme for sinkhole attacks in wireless sensor netw...
Abstract — Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide rang...
Wireless sensor networks (WSN’s) comprise limited energy small sensor nodes having the ability to mo...
Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target r...
Recently, wireless sensor networks (WSNs) have been widely used in many applications, such as Smart ...
With the continuous improvement of science and technology, wireless sensor network technology has gr...
AbstractWireless sensor networkshas a bright future because of its low-cost, save-power, and easy im...
International audienceThis work introduces two new cryptographic protocols of different complexity a...
International audienceThis work focuses on: (1) understanding the impact of selective forwarding att...
One of the most common attacks against Wireless Sensor Networks is the wormhole attack. In this atta...
Security is one of an important factor to be considered seriously in wireless sensor networks. In WS...
Denial of Services (DoS) attacks has long been a problem in ad-hoc and wireless networks during data...
ABSTRACT Most research related to secure routing in sensor networks has focused on how to detect and...
The widespread usage of Wireless sensor networks in various fields and application make it vulnerabl...