An Efficient Overlapped Groups based Compromised Nodes Detection at First Stage for WSN

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient scheme for removing compromised sensor nodes from wireless sensor networks

Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. Existing key revocation schemes can be divided into two categori...

متن کامل

An authentication scheme for locating compromised sensor nodes in WSNs

Wireless sensor networks have recently emerged as a promising computing model for many civilian and military applications. Sensor nodes in such a network are subject to varying forms of attacks since they are left unattended after deployment. Compromised nodes can, for example, tamper with legitimate reports or inject false reports in order to either distract the user from reaching the right de...

متن کامل

Secure & Energy-Efficient Intrusion Detection in WSN

Abstract: One of the most important goal in wireless sensor networks is to transmit the information to sink as soon as possible in a secure and energy efficient manner .The important factor that would make it possible to reach this goal is the design of efficient set selection algorithm in which only required number of sensors will be working such that the entire detection area is covered. In a...

متن کامل

Energy-Efficient WSN Architecture for Illegal Deforestation Detection

We present an energy-efficient wireless sensor network (WSN) architecture tailored for illegal deforestation detection. Illegal deforestation is a world-wide problem which may be prevented through improved monitoring of forested areas utilizing sensor networks equipped with chain-saw detection. Additional to detection, we identify sound source localization and sensor node localization as essent...

متن کامل

Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks

The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significant security breaches which lowers the integrity of gathered data. Using a reputation-based trust framework for wireless sensor networks we introduce a location-aware, trust-based protocol that detects and isolates compro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The International Conference on Electrical Engineering

سال: 2012

ISSN: 2636-4441

DOI: 10.21608/iceeng.2012.30677