The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security is a critical issue in many real-world applications of wireless sensor networks (WSNs). This research focuses on implementing security mechanisms, against two specific types of attack that occur in a network of MICAz motes. These are 'denial-of-service' (DoS) attacks where unnecessary packets are sent causing services to appear unavailable and thus these services are denied to the legitimate...
Taking into account the recent growth in research and development in wireless sensor networks it has been shown that they have a lot of scope in future. It is more important to pay attention to the security of wireless sensor networks as they are highly prone to threats. In this paper we propose a protocol for establishing the security mechanism of wireless sensor networks and devising a scheme for...
Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs). In this paper, we study data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We argue that classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once the adversary acquires the routing algorithm,...
Wireless sensor networks (WSN) have become increasingly one of the most promising and interesting areas over the past few years. But the character of constrained resources makes it vulnerable to Denial of Service (DoS) attacks, resulting in a large number of compromised nodes. Until now, it is unrealistic to prevent DoS attacks, but compromised nodes may be designed to self-recover to reduce the harm...
The development of sensor technology has led to applications ranging from academic to military. These tiny sensors are deployed in environments where security for data or hardware cannot be guaranteed. Unfortunately due to the resource constraints, traditional security schemes cannot be directly applied. In this paper, an efficient way of detecting an intrusion using ant colony is proposed. The architecture...
The following topics are dealt with: electronic crime; online private information disclosure; forensics; denial of service; phishing detection; honeypot; trust model; wireless sensor network; and Web site.
Wireless sensor networks have become a technology for the new millennium with the endless possibilities for applications ranging from academic to military. These tiny sensors are deployed in open environments, where security for data or hardware cannot be guaranteed. Unfortunately due to the resource constraints, traditional security schemes cannot be applied. Therefore designing protocols that can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.