With the widely deployment of wireless sensor networks in smart industrial systems, lots of unauthorized attacking from the adversary is greatly threating the security and privacy of the entire industrial systems, of which node replication attacks can hardly be defended since it is conducted in the physical layer. To solve this problem, we propose a secure random key distribution scheme, called SRKD, which provides a new method for the defense against the attack. Specifically, we combine a localized algorithm with a voting mechanism to support the detection and revocation of malicious nodes. We further change the meaning of the parameter s to help prevent the replication attack. Furthermore, the experimental results show that the detection ...
Clone Node Attack is the most perilous threat to the security of wireless sensor networks. In this a...
Sensor nodes are tiny, low-power, computationally limited and battery constrained electromechanical ...
A node replication attack against a wireless sensor network involves surreptitious efforts by an adv...
Wireless sensor networks are often deployed in hostile environments, where anadversary can physicall...
Wireless sensor networks are often deployed in hostile environments, where an adversary can physical...
Wireless sensor networks are susceptible to node replication attacks due to their unattended nature....
Abstract. Key pre-distribution schemes are a favored solution for es-tablishing secure communication...
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can ph...
[[abstract]]Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-co...
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained se...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
Key technological advances in wireless communications, Micro Electro Mechanical Systems (MEMS), and ...
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems a...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
Recent innovations in the field of technology led to the use of wireless sensor networks in variou...
Clone Node Attack is the most perilous threat to the security of wireless sensor networks. In this a...
Sensor nodes are tiny, low-power, computationally limited and battery constrained electromechanical ...
A node replication attack against a wireless sensor network involves surreptitious efforts by an adv...
Wireless sensor networks are often deployed in hostile environments, where anadversary can physicall...
Wireless sensor networks are often deployed in hostile environments, where an adversary can physical...
Wireless sensor networks are susceptible to node replication attacks due to their unattended nature....
Abstract. Key pre-distribution schemes are a favored solution for es-tablishing secure communication...
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can ph...
[[abstract]]Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-co...
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained se...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
Key technological advances in wireless communications, Micro Electro Mechanical Systems (MEMS), and ...
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems a...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
Recent innovations in the field of technology led to the use of wireless sensor networks in variou...
Clone Node Attack is the most perilous threat to the security of wireless sensor networks. In this a...
Sensor nodes are tiny, low-power, computationally limited and battery constrained electromechanical ...
A node replication attack against a wireless sensor network involves surreptitious efforts by an adv...