To address the vulnerability of geographic routing to multiple security threats such as false routing information, selective forwarding and the Sybil attack in wireless sensor networks, this paper proposes a trust-based defending model against above-mentioned multiple attacks. Considering the characteristics of resource-constrained sensor nodes, trust values of neighboring nodes on the routing path can be calculated through the Dirichlet distribution function, which is based on data packets ’ acknowledgements in a certain period instead of energy-consuming monitoring. Trust is combined with the cost of geographic and energy aware routing for selecting the next hop of routing. At the same time, the initial trust is dynamically determined, se...
Wireless Sensor Networks (WSNs) are being increasingly adopted in several fields because of their ad...
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity d...
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity d...
Abstract:- Wireless Sensor Networks (WSN) are vulnerable to a wide set of attacks which threaten the...
Abstract — Devices in a sensor network need to work in a hostile environment and they are usually po...
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and expos...
A Wireless sensor network (WSN) is usually composed of a large number of spatially distributed auton...
We consider the security of geographic routing (GR) that is widely used in ad hoc and wireless senso...
Routing is one of the most important operations in wireless sensor networks (WSNs) as it deals with ...
Smart Grid is the trend of next generation power distribution and management network that enable int...
Wireless Sensor Network (WSN) is considered as a useful alternative to provide prompt communication ...
Wireless Sensor Networks (WSNs) can be used for various applications, such as military, environmenta...
In most of the applications of wireless sensor networks (WSNs), nodes operate in unattended environm...
Traditional cryptography-based security mechanisms such as authentication and authorization are not ...
Abstract—Trust is an important factor in transferring data from the source to destination in wireles...
Wireless Sensor Networks (WSNs) are being increasingly adopted in several fields because of their ad...
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity d...
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity d...
Abstract:- Wireless Sensor Networks (WSN) are vulnerable to a wide set of attacks which threaten the...
Abstract — Devices in a sensor network need to work in a hostile environment and they are usually po...
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and expos...
A Wireless sensor network (WSN) is usually composed of a large number of spatially distributed auton...
We consider the security of geographic routing (GR) that is widely used in ad hoc and wireless senso...
Routing is one of the most important operations in wireless sensor networks (WSNs) as it deals with ...
Smart Grid is the trend of next generation power distribution and management network that enable int...
Wireless Sensor Network (WSN) is considered as a useful alternative to provide prompt communication ...
Wireless Sensor Networks (WSNs) can be used for various applications, such as military, environmenta...
In most of the applications of wireless sensor networks (WSNs), nodes operate in unattended environm...
Traditional cryptography-based security mechanisms such as authentication and authorization are not ...
Abstract—Trust is an important factor in transferring data from the source to destination in wireles...
Wireless Sensor Networks (WSNs) are being increasingly adopted in several fields because of their ad...
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity d...
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity d...