Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts …
K Cho, M Jo, T Kwon, HH Chen… - IEEE Systems Journal, 2012 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of tiny sensor nodes that communicate with each other over wireless channels, often in a hostile environment where nodes can be captured …
Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are …
K Cho, BG Lee, DH Lee - IEEE Transactions on dependable …, 2013 - ieeexplore.ieee.org
The forthcoming internet of things—an intelligent collaboration of resource-limited devices such as wireless sensor nodes that are embedded in the daily lives of users—poses new …
K Cho, BG Lee, K Lee, DH Lee - Iet Communications, 2013 - Wiley Online Library
The forthcoming Internet of Things–an intelligent collaboration of resource‐limited static/mobile devices that are embedded in the daily lives of users–poses new challenges to …
Résumé L'évolution rapide des technologies sans fil a permis l'émergence de nouveaux types de réseaux très dynamiques avec des architectures fortement décentralisées et dont …
R Sivaraj, R Thangarajan - 2014 Fourth International …, 2014 - ieeexplore.ieee.org
A Wireless Sensor Network (WSN) consists of several sensor nodes that are deployed in a aggressive environment to monitor and record the changes that take place in certain …
Sensor nodes set out in malicious surroundings and are susceptible to pickup and pact. An intruder may reach confidential hidden particulars from these sensors, clone and cleverly …
VR Prabha, P Latha - International Conference on Recent Trends in …, 2012 - Citeseer
ABSTRACT Wireless Sensor Networks deployed in hostile environment are vulnerable to many attacks due to the nature of deployment and poor physical security. An attacker can …