Since sensor nodes are implemented in embedded computer systems, which do not have complicated hardware architecture and operating system. Therefore, worm attacks, which exploit buffer-overflow vulnerabilities, could compromise the entire sensor network by sending a single mal-packet. To address the severe problem, the technique of software diversity has been leveraged to defend against sensor worms. In this paper, we encompass random sensor node scheduling and software diversity to propose a novel sensor worm defense scheme. Our scheme can effectively improve the sensor network defensive capability. Then some practical considerations for its real application is proposed. Finally, analytical and simulation results confirm the effectiveness ...
In some applications, wireless sensor devices must be secured, especially when the captured informat...
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly sus-ceptible to ...
ABSTRACT Most research related to secure routing in sensor networks has focused on how to detect and...
Abstract- Security of deployed wireless sensor networks (WSNs) has become a crucial task as the depl...
This paper explores Wireless Sensor Networks (WSNs) and the related security issues and complication...
As pervasive interconnection of autonomous sensor devices gave birth to a broad class of exiting new...
Due to their very nature, wireless sensor networks are perhaps the most vulnerable cate-gory of wire...
channel jamming”-based Denial-of-Service (DoS) attacks. An adversary can easily mask the events that...
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, le...
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevat...
The development of wireless sensor devices in terms of low power and inexpensive data-relaying has b...
This manuscript addresses the security challenges wireless sensor networks (WSNs) face due to their ...
The network performance of WSNs (Wireless Sensor Networks) can be improved significantly by injectin...
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the...
Wormhole attack is a severe threat against ubiquitous sensor networks. It can be launched without co...
In some applications, wireless sensor devices must be secured, especially when the captured informat...
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly sus-ceptible to ...
ABSTRACT Most research related to secure routing in sensor networks has focused on how to detect and...
Abstract- Security of deployed wireless sensor networks (WSNs) has become a crucial task as the depl...
This paper explores Wireless Sensor Networks (WSNs) and the related security issues and complication...
As pervasive interconnection of autonomous sensor devices gave birth to a broad class of exiting new...
Due to their very nature, wireless sensor networks are perhaps the most vulnerable cate-gory of wire...
channel jamming”-based Denial-of-Service (DoS) attacks. An adversary can easily mask the events that...
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, le...
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevat...
The development of wireless sensor devices in terms of low power and inexpensive data-relaying has b...
This manuscript addresses the security challenges wireless sensor networks (WSNs) face due to their ...
The network performance of WSNs (Wireless Sensor Networks) can be improved significantly by injectin...
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the...
Wormhole attack is a severe threat against ubiquitous sensor networks. It can be launched without co...
In some applications, wireless sensor devices must be secured, especially when the captured informat...
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly sus-ceptible to ...
ABSTRACT Most research related to secure routing in sensor networks has focused on how to detect and...