Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Designing Secure Protocols for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
A Maximum-Residual Multicast Protocol for Large-Scale Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks
Computer Communications
A dynamic en-route filtering scheme for data reporting in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
IEEE Transactions on Mobile Computing
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
IEEE/ACM Transactions on Networking (TON)
Computers and Electrical Engineering
IEEE Communications Magazine
Location-based compromise-tolerant security mechanisms for wireless sensor networks
IEEE Journal on Selected Areas in Communications
Constrained Function-Based Message Authentication for Sensor Networks
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
Wireless sensor networks are networked systems that are deployed in an application specific region to sense the events of interest. The sensed event information has to be reported to the base station. When the event report is transmitted, adversaries can inject false event messages through compromised nodes on the path of data transfer. Falsified event messages when forwarded through en-route nodes lead to wastage of their limited energy. This study proposes a energy efficient multipath data transfer scheme to address the troubles caused by false data injection attack. This can be done by early detection and filtering of injected false data. Moreover, the multipath data transfer technique prevents the direct access of event information by a compromised en-route node. Simulations show that the proposed scheme could significantly improve the performance of false data filtering process without losing resiliency against node compromisation and data compromisation.