How to construct random functions
Journal of the ACM (JACM)
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Secure Intrusion-tolerant Replication on the Internet
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Towards resilient geographic routing in WSNs
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A secure alternate path routing in sensor networks
Computer Communications
SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Wireless sensor network survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Secure Routing Protocol for Wireless Embedded Networks
RTCSA '08 Proceedings of the 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Wireless Sensor Network Security
Wireless Sensor Network Security
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Hi-index | 0.00 |
Limitations of sensors cause routing and data sending to the base station become one of the challenging issues in wireless sensor networks WSNs. So far, many methods are proposed for routing in the WSNs, but security is not mentioned in the most of them. Moreover, the proposed secure routings either are used for specific attack or have a high overhead. In this paper, we present a new method for neighbour detection and key management, and introduce a routing called intrusion/fault tolerant routing protocol IFRP. The routing is switched from single path to multipath in the face of malicious behaviour by local warden technique LWT. Proposed protocol detects and isolates intruder or faulty nodes by utilising LWT and a centralised decision. Simulations show that the IFRP have a superior delivery ratio over the mechanisms with low overhead. Moreover, results illustrate that the method with extra overhead has very low delivery ratio improvement by just 1%.