The great majority of processes in distributed sensor networks can only be accomplished via collaborative efforts of sensor nodes. However, the success of these processes is undermined by an attack termed controlled link establishment attack exemplified by node replication attack and key-swapping collusion attack based on their final attack goal. Countermeasures against the two latter attacks can be utilised as remedies for the controlled link establishment attack. Nevertheless, each of such countermeasures exposes its own limitations. In this paper, we propose a series of evolutionary schemes to overcome those limitations. The first two schemes are designed to be lightweight in performance at the cost of slightly weaker security robustness...
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can ph...
An increasing body of protocols has been proposed in recent years for detecting node replication att...
versity of Technology, Sydney. Faculty of Engineering and Information Technology.For over a decade, ...
Enabling security services such as encryption and authentication in distributed sensor networks (DSN...
Recent study has demonstrated that quite a few well-know pairwise key establishment schemes are susc...
Wireless sensor networks are often deployed in hostile environments, where anadversary can physicall...
Wireless sensor networks are often deployed in hostile environments, where an adversary can physical...
[[abstract]]Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-co...
Sensor networks allow to deploy large self-organized and adaptable sets of sensors for many applicat...
Purpose- Random key pre-distribution schemes are vulnerable to collusion attacks. The purpose of thi...
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained se...
Recent innovations in the field of technology led to the use of wireless sensor networks in variou...
Wireless sensor networks (WSN) are increasingly becoming the networks of choice in industrial, medic...
Abstract: Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an advers...
Abstract—A number of protocols have been developed to mitigate the threat against wireless sensor ne...
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can ph...
An increasing body of protocols has been proposed in recent years for detecting node replication att...
versity of Technology, Sydney. Faculty of Engineering and Information Technology.For over a decade, ...
Enabling security services such as encryption and authentication in distributed sensor networks (DSN...
Recent study has demonstrated that quite a few well-know pairwise key establishment schemes are susc...
Wireless sensor networks are often deployed in hostile environments, where anadversary can physicall...
Wireless sensor networks are often deployed in hostile environments, where an adversary can physical...
[[abstract]]Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-co...
Sensor networks allow to deploy large self-organized and adaptable sets of sensors for many applicat...
Purpose- Random key pre-distribution schemes are vulnerable to collusion attacks. The purpose of thi...
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-constrained se...
Recent innovations in the field of technology led to the use of wireless sensor networks in variou...
Wireless sensor networks (WSN) are increasingly becoming the networks of choice in industrial, medic...
Abstract: Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an advers...
Abstract—A number of protocols have been developed to mitigate the threat against wireless sensor ne...
Wireless Sensor Networks (WSNs) are often deployed in hostile environments where an adversary can ph...
An increasing body of protocols has been proposed in recent years for detecting node replication att...
versity of Technology, Sydney. Faculty of Engineering and Information Technology.For over a decade, ...