## Abstract The range of applications of wireless sensor networks is so wide that it tends to invade our every day life. In the future, a sensor network will survey our health, our home, the roads we follow, the office or the industry we work in or even the aircrafts we use, in an attempt to enhanc
On handling insider attacks in wireless sensor networks
✍ Scribed by Christoph Krauß; Markus Schneider; Claudia Eckert
- Publisher
- Elsevier Science
- Year
- 2008
- Tongue
- English
- Weight
- 185 KB
- Volume
- 13
- Category
- Article
- ISSN
- 1363-4127
No coin nor oath required. For personal study only.
📜 SIMILAR VOLUMES
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious ''new'' nodes
In scenarios where sensors are placed randomly, redundant deployment is essential for ensuring adequate field coverage. This redundancy needs to be efficiently exploited by periodically selecting a subset of nodes (referred to as a ''cover'') that actively monitor the field, and putting the remainin
Wireless sensor networks (WSNs) have proven to be useful in many applications, such as military surveillance and environment monitoring. To meet the severe energy constraints in WSNs, several researchers have proposed to use the in-network data aggregation technique (i.e., combining partial results