AbstractSensor networks may suffer different types of malicious attacks like false report injection attacks, Selective forwarding attacks. Military uses sensor networks for battlefield surveillance. Sensors could monitor vehicular traffic and track the position of the enemy. Recently, a number of filtering schemes against false reports have been proposed. However, they either lack strong filtering capacity or cannot support highly dynamic sensor networks very well. Moreover, few of them can deal with DoS attacks simultaneously. We design the Hill Climbing key dissemination approach and Greedy perimeter stateless routing for wireless networks, that ensures the nodes closer to data sources have stronger filtering capacity. Moreover, we exploi...
The injection attack of false data is a common attack form in wireless sensor network. This attack f...
Because of their low cost, small size, low resources and self-organizing nature a Wireless Sensor Ne...
With the development and wide use of wireless sensor network, security arises as an essential issue ...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
Wireless sensor networks consist of a large number of small sensor nodes having limited computation ...
Abstract- Sensor nodes may be deployed in hostile environments. An adversary may compromise the sens...
Abstract — Wireless Sensor Networks are less used because of lack of good security mechanism, need t...
Sensor nodes may be deployed in hostile environments. An adversary may compromise the sensor nodes a...
ABSTRACT Most research related to secure routing in sensor networks has focused on how to detect and...
[[abstract]]Compromised nodes could launch several attacks in wireless sensor network. The easiest w...
Wireless Sensor networks are composed of huge number of motes having less energy, memory and computa...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Today, wireless sensor networks (WSNs) are applied to various industries such as building automation...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
tackers could inject false measurements to the controller through compromised sensor nodes, which no...
The injection attack of false data is a common attack form in wireless sensor network. This attack f...
Because of their low cost, small size, low resources and self-organizing nature a Wireless Sensor Ne...
With the development and wide use of wireless sensor network, security arises as an essential issue ...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
Wireless sensor networks consist of a large number of small sensor nodes having limited computation ...
Abstract- Sensor nodes may be deployed in hostile environments. An adversary may compromise the sens...
Abstract — Wireless Sensor Networks are less used because of lack of good security mechanism, need t...
Sensor nodes may be deployed in hostile environments. An adversary may compromise the sensor nodes a...
ABSTRACT Most research related to secure routing in sensor networks has focused on how to detect and...
[[abstract]]Compromised nodes could launch several attacks in wireless sensor network. The easiest w...
Wireless Sensor networks are composed of huge number of motes having less energy, memory and computa...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Today, wireless sensor networks (WSNs) are applied to various industries such as building automation...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
tackers could inject false measurements to the controller through compromised sensor nodes, which no...
The injection attack of false data is a common attack form in wireless sensor network. This attack f...
Because of their low cost, small size, low resources and self-organizing nature a Wireless Sensor Ne...
With the development and wide use of wireless sensor network, security arises as an essential issue ...