— In Wireless Sensor Network (WSN) applications, sensor nodes are often deployed in harsh environments. Routine maintenance, fault detection and correction is difficult, infrequ...
Hai Li, Mark C. Price, Jonathan Stott, Ian W. Mars...
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Abstract. Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster no...
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...