Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widel...