Secure communications over insecure channels
Communications of the ACM
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Directed diffusion for wireless sensor networking
IEEE/ACM Transactions on Networking (TON)
A survey on wireless multimedia sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Applying Video Sensor Networks to Nearshore Environment Monitoring
IEEE Pervasive Computing
On supporting distributed collaboration in sensor networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
IEEE Communications Magazine
A stream-data oriented secure routing protocol in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Reliable operational services in MANETs by misbehavior-tolerant quorum systems
Proceedings of the 8th International Conference on Network and Service Management
Hi-index | 0.00 |
The authenticity of the data collected by the sink is pivotal to a lot of WSN applications. But as the monitoring environment and objects are more and more complex, traditional secure protocols are not fit for the false data injection attack. In this paper, EASY, an effective secure routing for false data injection attack is presented. EASY can effectively resolve the contradiction between security requirement and additional load and guarantee to get the required security with the satiable overload.