Sensor networks are a branch of distributed ad hoc networks with a broad range of applications in surveillance and environment monitoring. In these networks, message exchanges are carried out in a multi-hop manner. Due to resource constraints, security professionals often use lightweight protocols, which do not provide adequate security. Even in the absence of constraints, designing a foolproof set of protocols and codes is almost impossible. This leaves the door open to the worms that take advantage of the vulnerabilities to propagate via exploiting the multi-hop message exchange mechanism. This issue has drawn the attention of security researchers recently. In this paper, we investigate the propagation pattern of information in wireless s...
As an infrastructure of Internet of Things, WSNs (Wireless Sensor Networks) play a more and more imp...
WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks ...
Abstract. In this paper, we propose two mechanisms for wormhole detection in wireless sensor network...
Sensor networks are a branch of distributed ad hoc networks with a broad range of applications in su...
Sensor networks are a branch of distributed ad hoc networks with a broad range of applications in su...
This manuscript addresses the security challenges wireless sensor networks (WSNs) face due to their ...
Abstract—Worms have become an emergent threat towards information confidentiality, integrity, and se...
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions....
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
Abstract—We study the potential threat for virus spread in wireless sensor networks (WSNs). Using ep...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
While multi-hop broadcast protocols, such as Trickle, Deluge and MNP, have gained tremendous pop-ula...
A major issue in Wireless Sensor Networks (WSN) is the efficient dissemination of data from sources ...
Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating s...
Due to limited resources, wireless sensor network (WSN) nodes generally possess weak defense capabil...
As an infrastructure of Internet of Things, WSNs (Wireless Sensor Networks) play a more and more imp...
WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks ...
Abstract. In this paper, we propose two mechanisms for wormhole detection in wireless sensor network...
Sensor networks are a branch of distributed ad hoc networks with a broad range of applications in su...
Sensor networks are a branch of distributed ad hoc networks with a broad range of applications in su...
This manuscript addresses the security challenges wireless sensor networks (WSNs) face due to their ...
Abstract—Worms have become an emergent threat towards information confidentiality, integrity, and se...
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions....
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
Abstract—We study the potential threat for virus spread in wireless sensor networks (WSNs). Using ep...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
While multi-hop broadcast protocols, such as Trickle, Deluge and MNP, have gained tremendous pop-ula...
A major issue in Wireless Sensor Networks (WSN) is the efficient dissemination of data from sources ...
Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating s...
Due to limited resources, wireless sensor network (WSN) nodes generally possess weak defense capabil...
As an infrastructure of Internet of Things, WSNs (Wireless Sensor Networks) play a more and more imp...
WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks ...
Abstract. In this paper, we propose two mechanisms for wormhole detection in wireless sensor network...