A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey On Security In Wireless Sensor Network
2019
Southeast Europe Journal of Soft Computing
Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). ...
There is numerous applications for wireless sensor networks, and security is vital for many of them. ...
Sybil attack and wormhole attack are two major routing attacks specifically for WSNs. Karlof and Wagner [41] first considered routing security in wireless sensor networks systematically. ...
doi:10.21533/scjournal.v8i1.174
fatcat:5qi4jzi6g5cfldjyuhyf2qku7u
A Security Method for Multiple Attacks in Sensor Networks: Against False-Report Injection, False-Vote Injection and Wormhole Attacks
2014
Informatics Engineering an International Journal
In a large-scale wireless sensor network, damage spreads rapidly in the network when under false report injection, false votes injection, or wormhole attacks. ...
But the concurrent application of PVFS and LEAP provides inefficient duplications of operations in the sensor network. ...
(SECTOR) [19] , the WOrmhole attack DEfense mechanism (Wodem) [20] . ...
doi:10.5121/ieij.2014.2402
fatcat:rufh2ox4h5at3mg5ln7qlizkwy
International Journal of Enterprise Computing and Business Systems AN EMPIRICAL REVIEW ON ALGORITHMIC APPROACHES FOR SECURITY ENHANCEMENT IN THE WIRELESS SENSOR NETWORKS
unpublished
Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). ...
A typical Wireless Sensor Network (WSN) consists of a sink node sometimes referred to as a Base Station and a number of small wireless sensor nodes. ...
Sybil attack and wormhole attack are two major routing attacks specifically for WSNs. Karlof and Wagner first considered routing security in wireless sensor networks systematically. ...
fatcat:ly6dxfsiznf4hlnrpizdf4df3y
International Journal of Enterprise Computing and Business Systems AN EMPIRICAL REVIEW ON ALGORITHMIC APPROACHES FOR SECURITY ENHANCEMENT IN THE WIRELESS SENSOR NETWORKS
unpublished
Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). ...
A typical Wireless Sensor Network (WSN) consists of a sink node sometimes referred to as a Base Station and a number of small wireless sensor nodes. ...
The tunneling procedure forms a wormhole attack. Wang and Bhargava proposed a mechanism, MDS-VOW, to detect wormholes in a sensor network. ...
fatcat:e6ysav5xgfgpzj6kqa3xwenasq
A Trust-Based Adaptive Access Control Model for Wireless Sensor Networks
[article]
2016
Wireless Sensor Networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. ...
One emerging application for WSNs involves their use in healthcare where they are generally termed Wireless Medical Sensor Networks (WMSNs). ...
WODEM: wormhole attack
defense mechanism in wireless sensor networks. ...
doi:10.18745/th.16564
fatcat:xekkvlaw6jec5htpkjiatitj7m