Sensor nodes may be deployed in hostile environments. An adversary may compromise the sensor nodes and inject false data into the network, which wastes scarce energy resources of the forwarding nodes. Existing schemes can effectively resist false data injection, but most of them do not consider the identifiers (IDs) attack, the en-route nodes check only the Message Authentication Codes (MACs) and do not verify the nodes identifiers (IDs) of the endorsing reports. In this paper, we propose a novel security routing protocol (KCEFP) based on one-way key chain. The proposed protocol can resist false data injection, replay and IDs attacks, and if the endorsement report is modified, the forwarding nodes can verify the endorsement report by the ke...
Abstract — Wireless sensor networks offer unprecedented capabilities to monitor the physical world b...
Abstract—Given that transmission cost is significant in a Wireless Sensor Network (WSN), sending exp...
The major contribution of this paper is to propose a robust en-route filtering scheme for data authe...
Abstract- Sensor nodes may be deployed in hostile environments. An adversary may compromise the sens...
Wireless sensor networks consist of a large number of small sensor nodes having limited computation ...
[[abstract]]Compromised nodes could launch several attacks in wireless sensor network. The easiest w...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Abstract — Node compromise is a serious threat in wireless sensor networks. An adversary can use com...
Abstract—Sensor networks are vulnerable to false data injection attack and path-based denial of serv...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
tackers could inject false measurements to the controller through compromised sensor nodes, which no...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
Many sensor network applications are dependent on the secure operation of sensor networks, and will ...
Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised no...
Abstract — Wireless sensor networks offer unprecedented capabilities to monitor the physical world b...
Abstract—Given that transmission cost is significant in a Wireless Sensor Network (WSN), sending exp...
The major contribution of this paper is to propose a robust en-route filtering scheme for data authe...
Abstract- Sensor nodes may be deployed in hostile environments. An adversary may compromise the sens...
Wireless sensor networks consist of a large number of small sensor nodes having limited computation ...
[[abstract]]Compromised nodes could launch several attacks in wireless sensor network. The easiest w...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
Abstract — Node compromise is a serious threat in wireless sensor networks. An adversary can use com...
Abstract—Sensor networks are vulnerable to false data injection attack and path-based denial of serv...
Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication ove...
tackers could inject false measurements to the controller through compromised sensor nodes, which no...
AbstractSensor networks may suffer different types of malicious attacks like false report injection ...
Many sensor network applications are dependent on the secure operation of sensor networks, and will ...
Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised no...
Abstract — Wireless sensor networks offer unprecedented capabilities to monitor the physical world b...
Abstract—Given that transmission cost is significant in a Wireless Sensor Network (WSN), sending exp...
The major contribution of this paper is to propose a robust en-route filtering scheme for data authe...