Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
With the field of wireless sensor networks rapidly maturing, the focus shifts from “easy” deployments, like remote monitoring, to more difficult domains where applications imp...
Mario Strasser, Andreas Meier, Koen Langendoen, Ph...
Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local informa...
Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
Abstract—One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of “intrusion” is not cle...
Ioannis Krontiris, Thanassis Giannetsos, Tassos Di...