搜索资源列表
-
0下载:
In this paper, we propose
a novel scheme for detecting clone attacks in sensor networks,
which computes for each sensor a social fingerprint
by extracting the neighborhood characteristics, and verifies
the legitimacy of the originator for eac
-
-
0下载:
We propose a trust-based decision framework for wireless sensor
networks coupled with a non-deterministic routing protocol. Both provide a mechanism
to effectively detect and confine common attacks, and, unlike previous approaches, allow bad
re
-
-
0下载:
The sensor networks application domain continues to increase with the need for an
effective security mechanism. The fact that WSN often deal with sensitive data operating in
hostile and unexpected environments, makes the concept of security consi
-
-
0下载:
In this dissertation, there are four main aspects included: energy reservation on
MAC layer, secure improvement for DoS attacks on MAC layer, query processing with
uncertainty for sensor systems, and throughput maximization on MAC layer
for ult
-
-
0下载:
Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or
more sensor nodes and reveal all stored security information which enables him to compromise a part of the
WSN communications. Due to lar
-
-
0下载:
Secure routing in wireless sensor networks: attacks and countermeasures
-