Abstract | ||
---|---|---|
Sensor nodes are of low-cost and hence vulnerable to attacks. The adversaries need not endure hardship to control these nodes. Malicious nodes or compromised nodes are difficult to detect. These malicious nodes drain the energy available, give false readings, project itself to be as one of the routers hence attracting all the packets leading to denial of service attack. This paper is trying to test the nodes for its fidelity by considering one of the normal procedures to initiate action among the normal nodes. The paper utilizes public key cryptographic methods and TDMA technology to accomplish the task. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1007/978-3-642-17610-4_24 | Communications in Computer and Information Science |
Keywords | Field | DocType |
security,authentication,wireless sensor network,LEACH | Wireless network,Key distribution in wireless sensor networks,Authentication,Computer security,Computer science,Network packet,Computer network,Wireless WAN,Mobile wireless sensor network,Wi-Fi array,Wireless sensor network | Conference |
Volume | ISSN | Citations |
122 | 1865-0929 | 0 |
PageRank | References | Authors |
0.34 | 4 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
N. Ambika | 1 | 0 | 1.01 |
G. T. Raju | 2 | 0 | 2.37 |