A compromised node in wireless sensor networks can be used to create false messages by generating them on their own or by falsifying legitimate messages received from other nodes. Because compromised nodes that create false messages can waste a considerable amount of network resources, we should detect them as early as possible. Existing studies for detecting such nodes can only be used in situations where sensor nodes do not move. However, it is possible that nodes move because of wind or other factors in real situations. We improve existing studies for detecting compromised nodes in mobile wireless sensor networks. In the proposed method, an agent exists on each node and it appends its ID and a k-bit code to an event message and the sink ...
Mobile wireless sensor networks (MWSNs) comprise a collection of mobile sensor nodes with confined a...
Abstract: A wireless Sensor Network transfers the data one node to another node, energy efficient ma...
Abstract — Node replication detection is a challenging problem. Though the defending against node re...
In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. How...
The primary function of wireless sensor networks is to gather sensor data from the monitored area. D...
28th Signal Processing and Communications Applications Conference (SIU) -- OCT 05-07, 2020 -- ELECTR...
Abstract — Sensor readings are vulnerable to in situ and in transit anomalies. A well designed anoma...
Mobile wireless sensor networks (MWSNs) are commonly deployed in a harsh climate, notably unattended...
Wireless Sensor Network (WSN) technology uses many nodes in a network for transformation of data. De...
With the development and wide use of wireless sensor network, security arises as an essential issue ...
This paper presents a model for ensuring data integrity using anomalous node identification in non-h...
As of date, wireless sensor systems (WSNs) have gotten much consideration as methods for gathering a...
One of the most vexing problems in wireless sensor network security is the node capture attack. An a...
Wireless Sensor networks are composed of huge number of motes having less energy, memory and computa...
Target detection wireless sensor networks (WSNs), where binary decisions are transmitted to declare ...
Mobile wireless sensor networks (MWSNs) comprise a collection of mobile sensor nodes with confined a...
Abstract: A wireless Sensor Network transfers the data one node to another node, energy efficient ma...
Abstract — Node replication detection is a challenging problem. Though the defending against node re...
In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. How...
The primary function of wireless sensor networks is to gather sensor data from the monitored area. D...
28th Signal Processing and Communications Applications Conference (SIU) -- OCT 05-07, 2020 -- ELECTR...
Abstract — Sensor readings are vulnerable to in situ and in transit anomalies. A well designed anoma...
Mobile wireless sensor networks (MWSNs) are commonly deployed in a harsh climate, notably unattended...
Wireless Sensor Network (WSN) technology uses many nodes in a network for transformation of data. De...
With the development and wide use of wireless sensor network, security arises as an essential issue ...
This paper presents a model for ensuring data integrity using anomalous node identification in non-h...
As of date, wireless sensor systems (WSNs) have gotten much consideration as methods for gathering a...
One of the most vexing problems in wireless sensor network security is the node capture attack. An a...
Wireless Sensor networks are composed of huge number of motes having less energy, memory and computa...
Target detection wireless sensor networks (WSNs), where binary decisions are transmitted to declare ...
Mobile wireless sensor networks (MWSNs) comprise a collection of mobile sensor nodes with confined a...
Abstract: A wireless Sensor Network transfers the data one node to another node, energy efficient ma...
Abstract — Node replication detection is a challenging problem. Though the defending against node re...