Security attacks in wireless sensor networks: A survey
P Dewal, GS Narula, V Jain, A Baliyan - Cyber Security: Proceedings of …, 2018 - Springer
Security is one of the major concerns in sensor networks. Wireless sensor network
comprises of huge amount of nodes called as tiny sensor nodes. The nodes are required to …
comprises of huge amount of nodes called as tiny sensor nodes. The nodes are required to …
Design and analysis of a generalized canvas protocol
M Novotný - IFIP International Workshop on Information Security …, 2010 - Springer
The Canvas protocol was developed by Harald Vogt [10] and should provide data integrity in
Wireless Sensor Networks. However, Dieter Gollmann published [5] an attack on the …
Wireless Sensor Networks. However, Dieter Gollmann published [5] an attack on the …
A novel robust routing protocol RAEED to avoid DoS attacks in WSN
Many of the WSN routing protocols are vulnerable to DoS attack such as Hello Flood Attack,
Sink hole and Black hole attack etc. In this paper, we are principally focus on one attack …
Sink hole and Black hole attack etc. In this paper, we are principally focus on one attack …
Analysis of LEACH protocol (s) using formal verification
A Ihsan, K Saghar, T Fatima - 2015 12th International Bhurban …, 2015 - ieeexplore.ieee.org
WSN nodes operate in an unattended environment and thus have irreplaceable batteries.
Thus an important concern is the network lifetime; we need to utilize their energy for a longer …
Thus an important concern is the network lifetime; we need to utilize their energy for a longer …
Slede: a domain-specific verification framework for sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the
implementations of sensor network security protocols is even harder because they are …
implementations of sensor network security protocols is even harder because they are …
Formal modelling of a robust wireless sensor network routing protocol
Because of their low cost, small size, low resources and self-organizing nature a Wireless
Sensor Network (WSN) is a potential solution in hostile environments including military …
Sensor Network (WSN) is a potential solution in hostile environments including military …
Raeed: A solution for hello flood attack
Hello flood attack has long been a problem in ad-hoc and wireless networks during data
routing. Although numerous solutions have been proposed, they all have drawbacks. The …
routing. Although numerous solutions have been proposed, they all have drawbacks. The …
RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network
Denial of Services (DoS) attacks has long been a problem in ad-hoc and wireless networks
during data routing. The aim of DoS attacks is to disrupt the routing and prevent data …
during data routing. The aim of DoS attacks is to disrupt the routing and prevent data …
Towards verifying correctness of wireless sensor network applications using insense and spin
The design and implementation of wireless sensor network applications often require
domain experts, who may lack expertise in software engineering, to produce resource …
domain experts, who may lack expertise in software engineering, to produce resource …
Achieving energy efficiency through load balancing: A comparison through formal verification of two WSN routing protocols
Network lifetime is one of the most crucial factors that affect the performance of a Wireless
Sensor Network (WSN). In order to maximize the network lifetime, it is essential that a routing …
Sensor Network (WSN). In order to maximize the network lifetime, it is essential that a routing …