An Efficient Overlapped Groups based Compromised Nodes Detection at First Stage for WSN
نویسندگان
چکیده
منابع مشابه
An efficient scheme for removing compromised sensor nodes from wireless sensor networks
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. Existing key revocation schemes can be divided into two categori...
متن کاملAn authentication scheme for locating compromised sensor nodes in WSNs
Wireless sensor networks have recently emerged as a promising computing model for many civilian and military applications. Sensor nodes in such a network are subject to varying forms of attacks since they are left unattended after deployment. Compromised nodes can, for example, tamper with legitimate reports or inject false reports in order to either distract the user from reaching the right de...
متن کاملSecure & Energy-Efficient Intrusion Detection in WSN
Abstract: One of the most important goal in wireless sensor networks is to transmit the information to sink as soon as possible in a secure and energy efficient manner .The important factor that would make it possible to reach this goal is the design of efficient set selection algorithm in which only required number of sensors will be working such that the entire detection area is covered. In a...
متن کاملEnergy-Efficient WSN Architecture for Illegal Deforestation Detection
We present an energy-efficient wireless sensor network (WSN) architecture tailored for illegal deforestation detection. Illegal deforestation is a world-wide problem which may be prevented through improved monitoring of forested areas utilizing sensor networks equipped with chain-saw detection. Additional to detection, we identify sound source localization and sensor node localization as essent...
متن کاملLocation-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significant security breaches which lowers the integrity of gathered data. Using a reputation-based trust framework for wireless sensor networks we introduce a location-aware, trust-based protocol that detects and isolates compro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The International Conference on Electrical Engineering
سال: 2012
ISSN: 2636-4441
DOI: 10.21608/iceeng.2012.30677