Two Step Verification technique For Detection of Malicious Nodes in Wireless Sensor Networks
نویسندگان
چکیده
منابع مشابه
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملRole of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks
In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...
متن کاملRole of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks
In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...
متن کاملRole of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks
In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...
متن کاملRole of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks
In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
سال: 2019
ISSN: 0973-8975,2454-7190
DOI: 10.26782/jmcms.2019.02.00032