Two Step Verification technique For Detection of Malicious Nodes in Wireless Sensor Networks

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

Role of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks

In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...

متن کامل

Role of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks

In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...

متن کامل

Role of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks

In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...

متن کامل

Role of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks

In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES

سال: 2019

ISSN: 0973-8975,2454-7190

DOI: 10.26782/jmcms.2019.02.00032