International audienceThis paper focuses on the resiliency of wireless sensor network routing protocols against selective forwarding attacks by compromised nodes. To provide for security in such a context cryptographic solutions must be completed by algorithmic solutions considering "beyond cryptography" approaches. Enhancing the routing protocol resiliency to attacks is one approach that merits further investigation. In a sense, resiliency to compromised nodes enhances the reliability of sensor networks. In this article, after discussing the shortcomings of existing routing protocols against packet-dropping malicious nodes we describe some protocol behaviors enhancing resiliency in this particular context. These behaviors are mainly based ...
Abstract — A wireless sensor network consists of a number of sensors spreading across a geographical...
In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) p...
We consider routing security in wireless sensor networks. Many sensor network routing protocols have...
International audienceThis paper focuses on the resiliency of wireless sensor network routing protoc...
Abstract—This paper focuses on the resiliency of wireless sensor network routing protocols against s...
International audienceThis paper considers security in wireless sensor networks (WSNs), focusing at ...
International audienceLittle effort has been made to compare routing pro- tocols according to their ...
Wireless Sensor Networks have some well known features such as low battery consumption, changing top...
International audienceThis work focuses on: (1) understanding the impact of selective forwarding att...
International audienceThis work introduces two new cryptographic protocols of different complexity a...
Les travaux réalisés dans cette thèse se situent dans le domaine des réseaux de capteurs sans fil (W...
This thesis focuses on the security issues of multi-hop routing protocols for Wireless Sensor Networ...
In the last decade Wireless Sensor Networks (WSNs) have been gaining recognition due to the fact tha...
International audienceThe main focus of this paper is the resilience of communication protocols for ...
Fault tolerance is an essential requirement in the design of protocols and applications for Wireless...
Abstract — A wireless sensor network consists of a number of sensors spreading across a geographical...
In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) p...
We consider routing security in wireless sensor networks. Many sensor network routing protocols have...
International audienceThis paper focuses on the resiliency of wireless sensor network routing protoc...
Abstract—This paper focuses on the resiliency of wireless sensor network routing protocols against s...
International audienceThis paper considers security in wireless sensor networks (WSNs), focusing at ...
International audienceLittle effort has been made to compare routing pro- tocols according to their ...
Wireless Sensor Networks have some well known features such as low battery consumption, changing top...
International audienceThis work focuses on: (1) understanding the impact of selective forwarding att...
International audienceThis work introduces two new cryptographic protocols of different complexity a...
Les travaux réalisés dans cette thèse se situent dans le domaine des réseaux de capteurs sans fil (W...
This thesis focuses on the security issues of multi-hop routing protocols for Wireless Sensor Networ...
In the last decade Wireless Sensor Networks (WSNs) have been gaining recognition due to the fact tha...
International audienceThe main focus of this paper is the resilience of communication protocols for ...
Fault tolerance is an essential requirement in the design of protocols and applications for Wireless...
Abstract — A wireless sensor network consists of a number of sensors spreading across a geographical...
In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) p...
We consider routing security in wireless sensor networks. Many sensor network routing protocols have...