We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a sensor. In some applications, when the network is...
详细信息
In this paper, we analyze one of the secure mobile ad hoc networks protocols, which is Authenticated routing for ad hoc networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is base...
详细信息
Globally unique ID allocation is usually not applicable in a sensor network due to the massive production of cheap sensor nodes, the limited bandwidth, and the size of the payload. However, locally unique IDs are stil...
详细信息
This paper focuses on the assessment of the properties of security enforcement mechanisms for prevention of denial of service (DoS) attacks in wireless sensor networks. First part of the paper demonstrates the require...
详细信息
security is one of the top concerns when sensorsare deployed in hostile environments for military applications. Attacks on sensor nodes can be categorized into two types: attacks through radio signals to alter the fun...
详细信息
A typical characteristic of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication paths. The search for reliable communication methodologies in this area in combinat...
详细信息
A DDoS (distributed Denial-Of-Service) attack is a distributed, large-scale attempt by malicious users to flood the victim network with an enormous number of packets. This exhausts the victim network of resources such...
详细信息
Symmetric cryptographic primitives are preferable in designing security protocols for mobile ad hoc networks (MANETs) because they are computationally affordable for resource-constrained mobile devices forming a MANET...
详细信息
We propose a trust-based data management framework for enabling individual devices to harness the potential power of distributed computation, storage, and sensory resources available in pervasive computing environment...
详细信息
The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first identify various attacks that are effecti...
详细信息
暂无评论