[[abstract]]Compromised nodes could launch several attacks in wireless sensor network. The easiest way is to fabricate a report that doesn’t happen actually or to send incorrect data. Such attack will result in not only false alarm but also the energy consumption of intermediate nodes to forward this report. There are many schemes proposed to solve this problem. They use the idea that a legitimate report must consist of several endorsements given by multiple surrounding nodes that also sense the same event. However, the compromised node also can give false endorsement on real event causing the real report to be considered a false data and be filtered out. We proposed a filtering scheme to counter some related attacks, analyzed filtering eff...
Wireless sensor networks (WSNs) are open to false data injection attack when they are deployed in ho...
Increasing energy efficiency in wireless sensor networks is important because it is related to netwo...
With the development and wide use of wireless sensor network, security arises as an essential issue ...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks consist of a large number of small sensor nodes having limited computation ...
Abstract- Sensor nodes may be deployed in hostile environments. An adversary may compromise the sens...
Wireless sensor networks are comprised of sensor nodes with resource-constrained hardware. Nodes in ...
Abstract — Node compromise is a serious threat in wireless sensor networks. An adversary can use com...
Today, wireless sensor networks (WSNs) are applied to various industries such as building automation...
Wireless sensor network (WSN) is an emerging technology that has resulted in a variety of applicatio...
The injection attack of false data is a common attack form in wireless sensor network. This attack f...
Wireless sensor networks (WSNs) are open to false data injection attack when they are deployed in ho...
Increasing energy efficiency in wireless sensor networks is important because it is related to netwo...
With the development and wide use of wireless sensor network, security arises as an essential issue ...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks consist of a large number of small sensor nodes having limited computation ...
Abstract- Sensor nodes may be deployed in hostile environments. An adversary may compromise the sens...
Wireless sensor networks are comprised of sensor nodes with resource-constrained hardware. Nodes in ...
Abstract — Node compromise is a serious threat in wireless sensor networks. An adversary can use com...
Today, wireless sensor networks (WSNs) are applied to various industries such as building automation...
Wireless sensor network (WSN) is an emerging technology that has resulted in a variety of applicatio...
The injection attack of false data is a common attack form in wireless sensor network. This attack f...
Wireless sensor networks (WSNs) are open to false data injection attack when they are deployed in ho...
Increasing energy efficiency in wireless sensor networks is important because it is related to netwo...
With the development and wide use of wireless sensor network, security arises as an essential issue ...