This research paper proposes an algorithm to establish trust among the nodes of a lightweight wireless sensor-network using principles of Byzantine fault tolerance (BFT). Basing on BFT communication schemes and the location as part of the node’s identity, malicious nodes, traitors and attackers can be identified and potentially excluded from communication to ensure honest behaviour. Sybil- and man-in-the-middle-attacks by can be prevented as a sender’s identity particularly bases on network observations and therefore cannot be copied or imitated. Using multilateral communication, the origin of a message and the unchanged (signed) content can be checked by all network participants. Consequently, identity, authenticity and accountability of th...
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks t...
This paper analyse the most important and significant advancements in wireless sensor network using ...
Security techniques like cryptography and authentication can fail to protect a network once a node i...
The detection and isolation of compromised nodes in wire-less sensor networks is a difficult task. H...
In a decentralized sensor network, localization process relies on the integrity of participating sen...
Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send ...
Given the growing reliance of industry and government on online information services such as cloud c...
In this paper, Byzantine attacks in wireless sensor networks with mobile access (SENMA) points is co...
The sensor networks are popularly increasing and it used as a effective way in decision making infra...
This paper presents a new technique in preventing node cloning attack. The significant contribution ...
Abstract Node compromise is a serious threat to wireless sen-sor networks deployed in unattended an...
This paper presents a new technique in preventing node cloning attack. The significant contribution ...
Secure networks rely upon players to maintain security and reliability. However not every player can...
Building sensor networks poses challenges of secure routing, node authentication, data integrity, da...
Abstract — Many sensor network applications require sensors ’ locations to function correctly. Despi...
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks t...
This paper analyse the most important and significant advancements in wireless sensor network using ...
Security techniques like cryptography and authentication can fail to protect a network once a node i...
The detection and isolation of compromised nodes in wire-less sensor networks is a difficult task. H...
In a decentralized sensor network, localization process relies on the integrity of participating sen...
Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send ...
Given the growing reliance of industry and government on online information services such as cloud c...
In this paper, Byzantine attacks in wireless sensor networks with mobile access (SENMA) points is co...
The sensor networks are popularly increasing and it used as a effective way in decision making infra...
This paper presents a new technique in preventing node cloning attack. The significant contribution ...
Abstract Node compromise is a serious threat to wireless sen-sor networks deployed in unattended an...
This paper presents a new technique in preventing node cloning attack. The significant contribution ...
Secure networks rely upon players to maintain security and reliability. However not every player can...
Building sensor networks poses challenges of secure routing, node authentication, data integrity, da...
Abstract — Many sensor network applications require sensors ’ locations to function correctly. Despi...
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks t...
This paper analyse the most important and significant advancements in wireless sensor network using ...
Security techniques like cryptography and authentication can fail to protect a network once a node i...