A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
نویسندگان
چکیده
منابع مشابه
HYREP: A Hybrid Low-Power Protocol for Wireless Sensor Networks
In this paper, a new hybrid routing protocol is presented for low power Wireless Sensor Networks (WSNs). The new system uses an integrated piezoelectric energy harvester to increase the network lifetime. Power dissipation is one of the most important factors affecting lifetime of a WSN. An innovative cluster head selection technique using Cuckoo optimization algorithm has been used in the desig...
متن کاملA Security Protocol for Wireless Sensor Networks
In this paper, we present an security protocol for Wireless Sensor Networks (WSNs). It is based on the forward and backward property of RC4 states and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operation. Furthermore, an RC4-based hash function for the generation of Message Authentication Code (MAC) is presented. The propo...
متن کاملA New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key management that covers the establishment, distribution, renewing and revocation of cryptographic keys. Several key management protocols were proposed in the literature. Unfortunately, most of them are not resilient to nodes c...
متن کاملan efficient protocol for data aggregation in wireless sensor networks
sensor networks generally consist of a very great number of sensor nodes which will be spread into a vast environment and aggregate data out of it. the sensor nodes are afflicted with some limitations as follows memory, reception, communication as well as calculation capability, and battery power. the transmission of a great amount of extra data increases data transmission and proportionally in...
متن کاملFalse Data Injection-Resilient Security Routing Protocol for Wireless Sensor Networks
False data injection attack and PDoS (path-based Denial of Service) attack are serious threats in wireless sensor networks. Existing schemes can effectively resist false data injection and PDoS attacks, but most of them can not find out the compromised node when the base station or sink node detect the report is invalid. In this paper, we propose a false data injection-resilient security routin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Communications
سال: 2012
ISSN: 0140-3664
DOI: 10.1016/j.comcom.2011.09.005