Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base station. Furthermore, an adversary can cause serious damage by injecting a large amount of false messages to deplete the scarce energy resources of the forwarding en-route sensor nodes. In this paper, we propose a Secure Ticket-Based Enroute Filtering Scheme (STEF) that drops false messages enroute. We propose a ticket concept where reply messages are only forwarded if they contain a valid ticket originally issued by the base station. Messages containing no ticket, or an replayed ticket, are immediately filtered out by not compromised sensor nodes. The ticket concept...
Abstract — Wireless sensor networks offer unprecedented capabilities to monitor the physical world b...
tackers could inject false measurements to the controller through compromised sensor nodes, which no...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...
Abstract — Node compromise is a serious threat in wireless sensor networks. An adversary can use com...
[[abstract]]Compromised nodes could launch several attacks in wireless sensor network. The easiest w...
Sensor nodes may be deployed in hostile environments. An adversary may compromise the sensor nodes a...
Abstract- Sensor nodes may be deployed in hostile environments. An adversary may compromise the sens...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks consist of a large number of small sensor nodes having limited computation ...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Wireless sensor networks (WSN) collect and report event information to users in many applications (e...
In many wireless sensor network applications, sensor nodes that have a limited battery power are dep...
Abstract — Wireless sensor networks offer unprecedented capabilities to monitor the physical world b...
tackers could inject false measurements to the controller through compromised sensor nodes, which no...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...
Abstract — Node compromise is a serious threat in wireless sensor networks. An adversary can use com...
[[abstract]]Compromised nodes could launch several attacks in wireless sensor network. The easiest w...
Sensor nodes may be deployed in hostile environments. An adversary may compromise the sensor nodes a...
Abstract- Sensor nodes may be deployed in hostile environments. An adversary may compromise the sens...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks consist of a large number of small sensor nodes having limited computation ...
Wireless sensor networks collect data through collaborative communication between sensor nodes. sens...
Wireless sensor networks (WSN) collect and report event information to users in many applications (e...
In many wireless sensor network applications, sensor nodes that have a limited battery power are dep...
Abstract — Wireless sensor networks offer unprecedented capabilities to monitor the physical world b...
tackers could inject false measurements to the controller through compromised sensor nodes, which no...
Wireless sensor networks are supplied with limited energy resources and are usually installed in una...