A survey on secure multipath routing protocols in WSNs

E Stavrou, A Pitsillides - Computer Networks, 2010 - Elsevier
Routing protocols in wireless sensor networks (WSN) have been substantially investigated
by researches. Most state-of-the-art surveys have focused on reviewing the different routing …

[PDF][PDF] 物联网安全特征与关键技术

杨庚, 许建, 陈伟, 祁正华, 王海勇 - 2010 - cf.lcchina.org.cn
物联网的安全与隐私保护问题直接关系到物联网服务能否得到真正的实际推广应用,
从信息安全的机密性, 完整性和可用性等三个基本属性出发, 分析了物联网安全的特征和面临的 …

Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks

Y Challal, A Ouadjaout, N Lasla, M Bagaa… - Journal of network and …, 2011 - Elsevier
In wireless sensor networks, reliability is a design goal of a primary concern. To build a
comprehensive reliable system, it is essential to consider node failures and intruder attacks …

On-Demand Customizable Sensor Based Opportunistic Multipath Secure Routing Using Coalition Game Theory

K Stella, EN Ganesh - Asian Journal of Research in Social …, 2017 - indianjournals.com
Restricted by the energy storage capability of sensor nodes, it is crucial to jointly consider
security and reliability in data collection of Wireless Sensor Networks (WSNs). Challenging …

A reliable and secure multi-path routing strategy for underwater acoustic sensor networks

OG Uyan, A Akbas, VC Gungor - Computer Networks, 2022 - Elsevier
Abstract Underwater Acoustic Sensor Networks (UASNs) have nowadays become an
attractive topic in scientific studies and commercial applications. An important challenge in …

A distributed adaptive routing against selective forwarding attack in scale-free network considering cascading failure

R Yin, X Ma, H Yuan, M Zhai… - Journal of Complex …, 2023 - academic.oup.com
To address the issues of data insecurity and unreliable transmission, redundancy-based
data recovery can guarantee data security, but the increase of redundant data will reduce …

Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks

G Han, X Li, J Jiang, L Shu, J Lloret - The Computer Journal, 2015 - academic.oup.com
Recently, wireless sensor networks (WSNs) have been widely used in many applications,
such as Smart Grid. However, it is generally known that WSNs are energy limited, which …

Dynamic attack-resilient routing in software defined networks

PM Mohan, M Gurusamy, TJ Lim - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The scale of connected devices in the modern communication network and its
heterogeneous nature have made securing the network more challenging. However, with …

Evaluating energy cost of route diversity for security in wireless sensor networks

D Incebacak, K Bicakci, B Tavli - Computer Standards & Interfaces, 2015 - Elsevier
Route diversity improves the security of Wireless Sensor Networks (WSNs) against
adversaries attempting to obtain sensitive sensor data. By limiting the fraction of data …

Design and analysis of the key management mechanism in evolved multimedia broadcast/multicast service

Y Ren, JC Chen, JC Chin… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
3GPP introduced the key management mechanism (KMM) in evolved multimedia
broadcast/multicast service (eMBMS) to provide forward security and backward security for …