Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a particular challenge. This paper proposes to use formal methods to investigate the security of the INSENS protocol, in respect of its capability to withstand several denial of service attacks. The paper is an extension to our previous work where we proposed a formal framework to verify some wireless routing protocols. We have confirmed that the bidirectional verification employed by INSENS prevents attacks such as hello flood. However, INSENS is shown to be vulnerable to invisible node, wormhole and black hole attacks, even in a network of only a few nodes communi...
Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS...
Abstract — A Wireless Sensor Network can be defined as a group of independent nodes, communicating w...
Wireless Sensor Networks (WSNs) are particularly prone to security attacks. However, it is well-know...
Wireless Sensor Networks (WSNs) have attracted considerable research attention in recent years becau...
Because of their low cost, small size, low resources and self-organizing nature a Wireless Sensor Ne...
Wireless Sensor Networks (WSN) are composed of small, low cost, resource-constrained computing nodes...
Denial of Services (DoS) attacks has long been a problem in ad-hoc and wireless networks during data...
This paper evaluates the performance of INSENS, an INtrusion -tolerant routing protocol for wireles...
Wireless Sensor Networks (WSNs) have attracted considerable research attention in recent years becau...
In ad-hoc and wireless networks, Denial of Service (DoS) attacks has always been problematic during ...
Wireless Sensor Networks (WSNs) have being used in many fields like ocean and wildlife monitoring, m...
Black hole attack has long been a problem in wireless in data routing. Although numerous solutions h...
This paper explores Wireless Sensor Networks (WSNs) and the related security issues and complication...
Abstract — Wireless Sensor Networks (WSN) is an emerging technology now-a-days and has a wide range ...
Hello flood attack has long been a problem in ad-hoc and wireless networks during data routing. Alth...
Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS...
Abstract — A Wireless Sensor Network can be defined as a group of independent nodes, communicating w...
Wireless Sensor Networks (WSNs) are particularly prone to security attacks. However, it is well-know...
Wireless Sensor Networks (WSNs) have attracted considerable research attention in recent years becau...
Because of their low cost, small size, low resources and self-organizing nature a Wireless Sensor Ne...
Wireless Sensor Networks (WSN) are composed of small, low cost, resource-constrained computing nodes...
Denial of Services (DoS) attacks has long been a problem in ad-hoc and wireless networks during data...
This paper evaluates the performance of INSENS, an INtrusion -tolerant routing protocol for wireles...
Wireless Sensor Networks (WSNs) have attracted considerable research attention in recent years becau...
In ad-hoc and wireless networks, Denial of Service (DoS) attacks has always been problematic during ...
Wireless Sensor Networks (WSNs) have being used in many fields like ocean and wildlife monitoring, m...
Black hole attack has long been a problem in wireless in data routing. Although numerous solutions h...
This paper explores Wireless Sensor Networks (WSNs) and the related security issues and complication...
Abstract — Wireless Sensor Networks (WSN) is an emerging technology now-a-days and has a wide range ...
Hello flood attack has long been a problem in ad-hoc and wireless networks during data routing. Alth...
Existing end-to-end security mechanisms are vulnerable to path-based denial of service attacks (PDoS...
Abstract — A Wireless Sensor Network can be defined as a group of independent nodes, communicating w...
Wireless Sensor Networks (WSNs) are particularly prone to security attacks. However, it is well-know...