2013
DOI: 10.5121/ijcnc.2013.5107
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Two-Stage Algorithm Protecting Internal Attack from WSNs

Abstract: Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous applications with distributed network infrastructure. With its nature and application scenario, security of WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms are essential. Malicious or internal attacker has gained attention as the most challenging attacks to WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on eithe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 30 publications
(30 reference statements)
0
1
0
Order By: Relevance
“…Many researchers know that it is important to identify malicious intentions. To this end, many researches are undertaken based on abnormal behavior identification mechanism (ABIM) and dempster-shafer theory (DST) [69].…”
Section: Authenticationmentioning
confidence: 99%
“…Many researchers know that it is important to identify malicious intentions. To this end, many researches are undertaken based on abnormal behavior identification mechanism (ABIM) and dempster-shafer theory (DST) [69].…”
Section: Authenticationmentioning
confidence: 99%