An introduction to distributed algorithms
An introduction to distributed algorithms
SensorSim: a simulation framework for sensor networks
Proceedings of the 3rd ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Efficient tracing of failed nodes in sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
SPINS: security protocols for sensor networks
Wireless Networks
Denial of Service in Sensor Networks
Computer
TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
Simulating the power consumption of large-scale sensor network applications
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Decentralized intrusion detection in wireless sensor networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Anomaly intrusion detection in wireless sensor networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Hi-index | 0.00 |
Wireless sensor networks are subjected to several types of attacks specially attacks of denial of service types (DoS). A previous work proposes a routing strategy that considers alternative routes aiming to increase the resilience to the intrusion and allow efficient intrusion detection. This paper shows a revocation approach to reduce the number of intruders and enable new detection phase after a new route establishment phase. After the revocation, new intruders can be detected and revoked by their turn, minimising its effects over the network. After some turns, all of effective intruders can be revoked. The performance of the proposed approach was verified by simulation studies.