Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Wireless adhoc sensor and actuator networks on the farm
Proceedings of the 5th international conference on Information processing in sensor networks
Deploying a Wireless Sensor Network on an Active Volcano
IEEE Internet Computing
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Proceedings of the second ACM conference on Wireless network security
Fuzzy dynamic switching in quantum key distribution for Wi-Fi networks
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 3
A Novel Algorithm for Protecting from Internal Attacks of Wireless Sensor Networks
EUC '11 Proceedings of the 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing
J-Sim: a simulation and emulation environment for wireless sensor networks
IEEE Wireless Communications
Optimal Control-Based Strategy for Sensor Deployment
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Hi-index | 0.00 |
Wireless sensor network (WSNs) have been making up of a mass of spatially distributed autonomous sensors to monitor physical or environmental conditions. However, security threats to WSNs become increasingly diversified, prevention based due to their open nature. An adversary can easily eavesdrop and replay or inject fabricated messages. Different cryptographic methods can be used to defend against some of such attacks but very limited. For example, node compromise, another major problem of WSNs security, raised a serious challenge for WSNs as it allows an adversary to enter inside the security perimeter of the network. This paper is focusing on investigating internal attacks of distributed wireless sensor networks with multi-hop and single sinker, where we show our novel algorithm, with our new concept of controllable resiliency of WSNs, to ensure the targeted WSN always running at the designed resiliency level. The final experimental and simulation results showed that that the proposed algorithm does work well at the designed level.