Malicious packet dropping attack is a major security threat to the data traffic in the sensor network, since it reduces the legal network throughput and may hinder the propagation of sensitive data. Dealing with this attack is challenging since the unreliable wireless communication feature and resource constraints of the sensor network may cause communication failure and mislead to the incorrect decision about the presence of such attack. In this paper, we propose a data provenance based mechanism to detect the attack and identify the source of attack i.e. the malicious node. For this purpose, we utilize the characteristics of the watermarking based secure provenance transmission mechanism that we proposed earlier and rely on the inter-pack...
Security is the major area of concern in communication channel. Security is very crucial in wireless...
Sensor networks are becoming additional and additional widespread in varied application domains, lik...
Sensor networks are becoming additional and additional widespread in varied application domains, lik...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
IN Wireless sensor networks Large-scale sensor networks are deployed in numerous application domains...
A malicious foe may introduce additional nodes within the network or compromise existing ones. There...
Data provenance represents an important consider evaluating the standing of sensor data. Large-scale...
The sensor networks are popularly increasing and it used as a effective way in decision making infra...
Abstract—Security threat and routing holes in wireless scenario are more frequent than other network...
Sensor networks are utilized as a part of various application spaces, for example, digital physical ...
Abstract-Large-scale sensor networks are being deployed in numerous application domains, and often t...
A series of systems are connected to form a network. Vast amount of data moves through this network....
Wireless sensor networks are an emerging field where a large number of cheap sensors are dispersed o...
A malicious insider in a sensor network may sabotage the network at any level of operation. While mo...
In most wireless sensor networks (WSNs), sensor nodes generate data packets and send them to the bas...
Security is the major area of concern in communication channel. Security is very crucial in wireless...
Sensor networks are becoming additional and additional widespread in varied application domains, lik...
Sensor networks are becoming additional and additional widespread in varied application domains, lik...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
IN Wireless sensor networks Large-scale sensor networks are deployed in numerous application domains...
A malicious foe may introduce additional nodes within the network or compromise existing ones. There...
Data provenance represents an important consider evaluating the standing of sensor data. Large-scale...
The sensor networks are popularly increasing and it used as a effective way in decision making infra...
Abstract—Security threat and routing holes in wireless scenario are more frequent than other network...
Sensor networks are utilized as a part of various application spaces, for example, digital physical ...
Abstract-Large-scale sensor networks are being deployed in numerous application domains, and often t...
A series of systems are connected to form a network. Vast amount of data moves through this network....
Wireless sensor networks are an emerging field where a large number of cheap sensors are dispersed o...
A malicious insider in a sensor network may sabotage the network at any level of operation. While mo...
In most wireless sensor networks (WSNs), sensor nodes generate data packets and send them to the bas...
Security is the major area of concern in communication channel. Security is very crucial in wireless...
Sensor networks are becoming additional and additional widespread in varied application domains, lik...
Sensor networks are becoming additional and additional widespread in varied application domains, lik...