Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field. However, general sensor nodes are manufactured with inexpensive components, and they are short of security enhancement. Therefore, an adversary could capture and compromise sensor nodes easily, then aunch some malicious attacks (including tampering or discarding useful data collected from source nodes). In this paper, we propose a secure routing and aggregation protocol with low energy cost for sensor networks (named STAPLE), which utilizes one-way hash chain and multi-path mechanism to achieve security of wireless sensor networks, and develop a network expanding model to control communication cost incurred by multi-path routing. Then we dis...
Wireless Sensor Networks (WSNs) can be used for various applications, such as military, environmenta...
ABSTRACT:A wireless sensor network is a data communication system that consists of from several to t...
Wireless sensor network is autonomous and infrastructure less network. Now day’s different types of ...
Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field....
Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field....
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devic...
This paper presents an improved LEACH protocol to save energy and enhance network security for wirel...
Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, p...
International audienceIn this paper, we propose a novel secure routing protocol named Secure Multi-p...
Wireless sensor Networks (WSN) require secure aggregated routing of sensor data transmitted from sou...
For secure sensor network communication, secure and efficient routing mechanism is essential. Howeve...
The ease of deployment of economic sensor networks has always been a boon to disaster management app...
Abstract—Most routing protocols in wireless sensor networks take networks lifetime as design target,...
We consider routing security in wireless sensor networks. Many sensor network routing protocols have...
Abstract—Wireless sensor networks are facing many challenges such as the limited resource in process...
Wireless Sensor Networks (WSNs) can be used for various applications, such as military, environmenta...
ABSTRACT:A wireless sensor network is a data communication system that consists of from several to t...
Wireless sensor network is autonomous and infrastructure less network. Now day’s different types of ...
Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field....
Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field....
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devic...
This paper presents an improved LEACH protocol to save energy and enhance network security for wirel...
Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, p...
International audienceIn this paper, we propose a novel secure routing protocol named Secure Multi-p...
Wireless sensor Networks (WSN) require secure aggregated routing of sensor data transmitted from sou...
For secure sensor network communication, secure and efficient routing mechanism is essential. Howeve...
The ease of deployment of economic sensor networks has always been a boon to disaster management app...
Abstract—Most routing protocols in wireless sensor networks take networks lifetime as design target,...
We consider routing security in wireless sensor networks. Many sensor network routing protocols have...
Abstract—Wireless sensor networks are facing many challenges such as the limited resource in process...
Wireless Sensor Networks (WSNs) can be used for various applications, such as military, environmenta...
ABSTRACT:A wireless sensor network is a data communication system that consists of from several to t...
Wireless sensor network is autonomous and infrastructure less network. Now day’s different types of ...