The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In 2006, Du, Xiao, Chen, and Wu proposed a routing protocol for sensor networks using cell relay. They claimed their protocol was secure since they used pairwise key establishment. However, an adversary can implement attacks without keys or with only one newly deployed compromised node. Therefore, in this paper, we point out the vulnerabilities of this protocol and propose an improved protocol.
One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of "intrusion" is not clear in these networks. In this paper we investigate in depth one of the most severe attacks against sensor networks, namely the sinkhole attack, and we emphasize on strategies that an attacker can follow to successfully launch...
To solve radically the contradiction between the severely limited resource and security for the application in privacy-vital environment in wireless sensor networks (WSNs), we propose a new routing protocol called ITSRP: an Intrusion-tolerant secure routing protocol. We securely and efficiently reconstruct the routing packet in which we design some fields to emphasize the security accounting to the...
The range of applications of wireless sensor networks is so wide that it tends to invade our every-day life. In the future, a sensor network will surveil our health, our home, the roads we follow, the office or the industry we work in, or even the aircrafts we use, in an attempt to enhance our safety. However, the wireless sensor networks themselves are prone to security attacks. The list of security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.