International audienceThis paper focuses on the resiliency of wireless sensor network routing protocols against selective forwarding attacks by compromised nodes. Informally, resiliency should be understood as the capacity of the routing protocol to endure and mitigate the presence of a certain number of compromised nodes seeking to disturb the routing process. To provide for security when nodes may be compromised, cryptographic solutions must be completed by algorithmic solutions considering "beyond cryptography" approaches. In this article, after discussing the shortcomings of existing routing protocols against packet-dropping malicious nodes we describe some protocol behaviors enhancing routing resiliency under several combined routing a...
The main focus of this paper is the resilience of communication protocols for data gathering in dist...
Abstract—An ad hoc or a sensor network is composed of a collection of wireless nodes. A node can onl...
Fault tolerance is an essential requirement in the design of protocols and applications for Wireless...
International audienceThis paper focuses on the resiliency of wireless sensor network routing protoc...
Abstract—This paper focuses on the resiliency of wireless sensor network routing protocols against s...
International audienceThis paper considers security in wireless sensor networks (WSNs), focusing at ...
International audienceThis work focuses on: (1) understanding the impact of selective forwarding att...
International audienceThis work introduces two new cryptographic protocols of different complexity a...
International audienceLittle effort has been made to compare routing pro- tocols according to their ...
This thesis focuses on the security issues of multi-hop routing protocols for Wireless Sensor Networ...
Les travaux réalisés dans cette thèse se situent dans le domaine des réseaux de capteurs sans fil (W...
We consider routing security in wireless sensor networks. Many sensor network routing protocols have...
In the last decade Wireless Sensor Networks (WSNs) have been gaining recognition due to the fact tha...
In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) p...
Wireless Sensor Networks have some well known features such as low battery consumption, changing top...
The main focus of this paper is the resilience of communication protocols for data gathering in dist...
Abstract—An ad hoc or a sensor network is composed of a collection of wireless nodes. A node can onl...
Fault tolerance is an essential requirement in the design of protocols and applications for Wireless...
International audienceThis paper focuses on the resiliency of wireless sensor network routing protoc...
Abstract—This paper focuses on the resiliency of wireless sensor network routing protocols against s...
International audienceThis paper considers security in wireless sensor networks (WSNs), focusing at ...
International audienceThis work focuses on: (1) understanding the impact of selective forwarding att...
International audienceThis work introduces two new cryptographic protocols of different complexity a...
International audienceLittle effort has been made to compare routing pro- tocols according to their ...
This thesis focuses on the security issues of multi-hop routing protocols for Wireless Sensor Networ...
Les travaux réalisés dans cette thèse se situent dans le domaine des réseaux de capteurs sans fil (W...
We consider routing security in wireless sensor networks. Many sensor network routing protocols have...
In the last decade Wireless Sensor Networks (WSNs) have been gaining recognition due to the fact tha...
In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) p...
Wireless Sensor Networks have some well known features such as low battery consumption, changing top...
The main focus of this paper is the resilience of communication protocols for data gathering in dist...
Abstract—An ad hoc or a sensor network is composed of a collection of wireless nodes. A node can onl...
Fault tolerance is an essential requirement in the design of protocols and applications for Wireless...