Wireless Sensor Networks (WSNs) are being increasingly adopted in several fields because of their advantages with respect to classic sensor networks. However, nodes in a WSN cooperate and this exposes them to several security threats. Trust-based systems constitute an established solution to ensure security of distributed systems. In this work, a trust-based approach is discussed to make WSNs tolerant against attacks targeting their routing layer. We show how such attacks are tolerated with low overhead in comparison to unprotected systems. Preliminary experimental results are presented confirming the validity of the proposed approach
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor ne...
In Wireless Sensor Networks (WSNs), sensors collaborate to perform various tasks, such as routing. A...
Abstract —The wireless sensor network represents one of the most developing research areas with a lo...
Routing is one of the most important operations in wireless sensor networks (WSNs) as it deals with ...
As the trust issue in wireless sensor networks is emerging as one important factor in security schem...
Satisfactory results obtained from sensor networks and the ongoing development in electronics and wi...
Security techniques like cryptography and authentication can fail to protect a network once a node i...
Wireless Sensor Networks (WSNs) can be used for various applications, such as military, environmenta...
Wireless sensor networks have gained remarkable appreciation over the last few years. Despite signif...
A Wireless sensor network (WSN) is usually composed of a large number of spatially distributed auton...
Wireless sensor network are constituted by a large number of tiny size sensors and distributed rando...
The main purpose of the study is to review the evolution of wireless sensor network security and rou...
Traditional cryptography-based security mechanisms such as authentication and authorization are not ...
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and expos...
This paper analyse the most important and significant advancements in wireless sensor network using ...
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor ne...
In Wireless Sensor Networks (WSNs), sensors collaborate to perform various tasks, such as routing. A...
Abstract —The wireless sensor network represents one of the most developing research areas with a lo...
Routing is one of the most important operations in wireless sensor networks (WSNs) as it deals with ...
As the trust issue in wireless sensor networks is emerging as one important factor in security schem...
Satisfactory results obtained from sensor networks and the ongoing development in electronics and wi...
Security techniques like cryptography and authentication can fail to protect a network once a node i...
Wireless Sensor Networks (WSNs) can be used for various applications, such as military, environmenta...
Wireless sensor networks have gained remarkable appreciation over the last few years. Despite signif...
A Wireless sensor network (WSN) is usually composed of a large number of spatially distributed auton...
Wireless sensor network are constituted by a large number of tiny size sensors and distributed rando...
The main purpose of the study is to review the evolution of wireless sensor network security and rou...
Traditional cryptography-based security mechanisms such as authentication and authorization are not ...
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and expos...
This paper analyse the most important and significant advancements in wireless sensor network using ...
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor ne...
In Wireless Sensor Networks (WSNs), sensors collaborate to perform various tasks, such as routing. A...
Abstract —The wireless sensor network represents one of the most developing research areas with a lo...