2007 IEEE Wireless Communications and Networking Conference 2007
DOI: 10.1109/wcnc.2007.759
|View full text |Cite
|
Sign up to set email alerts
|

PRSA: A Path Redundancy Based Security Algorithm for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 17 publications
0
11
0
Order By: Relevance
“…Figure 2 shows the HARM of the virtualized system. The AT shown in Figure 2 for V M 1 (as shown in Table 1 [14], [15], [16] Application [17], [18] Diversity Topology [19], [20] Application [21], [22], [23], [24], [25], [26] Redundancy Topology [27], [28] Application [29], [30], [31], [32] …”
Section: Generating a Harmmentioning
confidence: 99%
See 2 more Smart Citations
“…Figure 2 shows the HARM of the virtualized system. The AT shown in Figure 2 for V M 1 (as shown in Table 1 [14], [15], [16] Application [17], [18] Diversity Topology [19], [20] Application [21], [22], [23], [24], [25], [26] Redundancy Topology [27], [28] Application [29], [30], [31], [32] …”
Section: Generating a Harmmentioning
confidence: 99%
“…at the topology layer, Kirrmann and Dzung [27] used Redundancy on any level of the communication stack (e.g., physical, link, or network layers). Al-Wakeel and Al-Swailemm [28] used path redundancy to mitigate sensor network attacks by using alternative routing paths for data transmission. At the application layer, Yuan et al [29] used software redundancy (example used are web server and database redundancy) in an event of an attack for the system architecture to adapt to the attack pattern.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the problems related to the issue of stealth dissemination is the one of routing or disseminating in sensor networks where one or more nodes are compromised (recent work in this direction being Hung et al [4], Al-Wakeel et al [5] An and Cam [6]). A probabilistic approach to determine which nodes might be compromised is frequently part of the approaches, for instance in Chen et al [7].…”
Section: B Routing In Network With Compromised Nodesmentioning
confidence: 99%
“…Redundancy and fault tolerance have been investigated in relation to wireless sensor networks and network security [5], [6], [7]. In the area of power systems, Hamoud et al [8] looked at reducing maintenance costs associated with equipment in a redundant customer delivery system.…”
Section: Introductionmentioning
confidence: 99%