The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Hi-index | 0.00 |
Attacks like fault data injection are not easy to prevent in resource-limited sensor networks. Especially in environments with urgent decision making trustworthy sensor networks are mandatory. Redundancy can be used to detect and isolate malicious behaving nodes and thus to secure the network. The presented approach implements trust based on off-the-shelf wireless sensor nodes and is more power efficient than one-single trusted node implementations with TPM technology.