Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust...
Authentication mechanism is the basis of access control and data exchange. In wireless sensor networ...
AbstractWireless Sensor Networks (WSNs) have shown great promise as the emerging technology for data...
AbstractTrust is being deployed along side with cryptography in WSN to achieve better security. This...
Trust establishment is an important tool to improve cooperation and enhance security in wireless sen...
As the trust issue in wireless sensor networks is emerging as one important factor in security schem...
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor ne...
Wireless Sensor Networks (WSNs) are being increasingly adopted in several fields because of their ad...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
This paper analyse the most important and significant advancements in wireless sensor network using ...
Cryptography based security solutions are not enough for WSNs when there are attacks from interior, ...
Wireless sensor network (WSN) faces severe security problems due to wireless communication between t...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
As a key component of the information sensing and aggregating for big data, cloud computing, and Int...
In Wireless Sensor Networks (WSNs), sensors collaborate to perform various tasks, such as routing. A...
Part 1: Full PapersInternational audienceCryptographic mechanisms alone are insufficient to protect ...
Authentication mechanism is the basis of access control and data exchange. In wireless sensor networ...
AbstractWireless Sensor Networks (WSNs) have shown great promise as the emerging technology for data...
AbstractTrust is being deployed along side with cryptography in WSN to achieve better security. This...
Trust establishment is an important tool to improve cooperation and enhance security in wireless sen...
As the trust issue in wireless sensor networks is emerging as one important factor in security schem...
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor ne...
Wireless Sensor Networks (WSNs) are being increasingly adopted in several fields because of their ad...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
This paper analyse the most important and significant advancements in wireless sensor network using ...
Cryptography based security solutions are not enough for WSNs when there are attacks from interior, ...
Wireless sensor network (WSN) faces severe security problems due to wireless communication between t...
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data....
As a key component of the information sensing and aggregating for big data, cloud computing, and Int...
In Wireless Sensor Networks (WSNs), sensors collaborate to perform various tasks, such as routing. A...
Part 1: Full PapersInternational audienceCryptographic mechanisms alone are insufficient to protect ...
Authentication mechanism is the basis of access control and data exchange. In wireless sensor networ...
AbstractWireless Sensor Networks (WSNs) have shown great promise as the emerging technology for data...
AbstractTrust is being deployed along side with cryptography in WSN to achieve better security. This...