Filters








5 Hits in 3.1 sec

A Survey On Security In Wireless Sensor Network

Faris Fazlic, Seyed Ali Hashemi, Ahmed Aletic, Ali Abd Almisreb, Syamimi Mohd Norzeli, Norashidah Md Din
2019 Southeast Europe Journal of Soft Computing  
Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs).  ...  There is numerous applications for wireless sensor networks, and security is vital for many of them.  ...  Sybil attack and wormhole attack are two major routing attacks specifically for WSNs. Karlof and Wagner [41] first considered routing security in wireless sensor networks systematically.  ... 
doi:10.21533/scjournal.v8i1.174 fatcat:5qi4jzi6g5cfldjyuhyf2qku7u

A Security Method for Multiple Attacks in Sensor Networks: Against False-Report Injection, False-Vote Injection and Wormhole Attacks

Su Man Nam, Tae Ho Cho
2014 Informatics Engineering an International Journal  
In a large-scale wireless sensor network, damage spreads rapidly in the network when under false report injection, false votes injection, or wormhole attacks.  ...  But the concurrent application of PVFS and LEAP provides inefficient duplications of operations in the sensor network.  ...  (SECTOR) [19] , the WOrmhole attack DEfense mechanism (Wodem) [20] .  ... 
doi:10.5121/ieij.2014.2402 fatcat:rufh2ox4h5at3mg5ln7qlizkwy

International Journal of Enterprise Computing and Business Systems AN EMPIRICAL REVIEW ON ALGORITHMIC APPROACHES FOR SECURITY ENHANCEMENT IN THE WIRELESS SENSOR NETWORKS

Sandeep Kaur, Vishal Walia, Rahul Malhotra, Jallandhar Punjab, India
unpublished
Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs).  ...  A typical Wireless Sensor Network (WSN) consists of a sink node sometimes referred to as a Base Station and a number of small wireless sensor nodes.  ...  Sybil attack and wormhole attack are two major routing attacks specifically for WSNs. Karlof and Wagner first considered routing security in wireless sensor networks systematically.  ... 
fatcat:ly6dxfsiznf4hlnrpizdf4df3y

International Journal of Enterprise Computing and Business Systems AN EMPIRICAL REVIEW ON ALGORITHMIC APPROACHES FOR SECURITY ENHANCEMENT IN THE WIRELESS SENSOR NETWORKS

Sandeep Kaur, Vishal Walia, Rahul
unpublished
Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs).  ...  A typical Wireless Sensor Network (WSN) consists of a sink node sometimes referred to as a Base Station and a number of small wireless sensor nodes.  ...  The tunneling procedure forms a wormhole attack. Wang and Bhargava proposed a mechanism, MDS-VOW, to detect wormholes in a sensor network.  ... 
fatcat:e6ysav5xgfgpzj6kqa3xwenasq

A Trust-Based Adaptive Access Control Model for Wireless Sensor Networks [article]

Htoo Aung Maw, UH Research Archive, UH Research Archive
2016
Wireless Sensor Networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications.  ...  One emerging application for WSNs involves their use in healthcare where they are generally termed Wireless Medical Sensor Networks (WMSNs).  ...  WODEM: wormhole attack defense mechanism in wireless sensor networks.  ... 
doi:10.18745/th.16564 fatcat:xekkvlaw6jec5htpkjiatitj7m