2019
DOI: 10.1002/dac.4234
|View full text |Cite
|
Sign up to set email alerts
|

Securing Wireless Sensor Networks Against Denial‐of‐Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol

Abstract: Wireless sensor networks (WSNs) have been vastly employed in the collection and transmission of data via wireless networks. This type of network is nowadays used in many applications for surveillance activities in various environments due to its low cost and easy communications. In these networks, the sensors use a limited power source which after its depletion, since it is nonrenewable, network lifetime ends. Due to the weaknesses in sensor nodes, they are vulnerable to many threats. One notable attack threat… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
73
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

3
6

Authors

Journals

citations
Cited by 84 publications
(80 citation statements)
references
References 55 publications
0
73
0
Order By: Relevance
“…The FP is calculated by the total number of things wrongly detected as the malicious things divided by the total number of normal things [16][17][18]. Therefore, the FPR is defined as illustrated in Eq.…”
Section: Fprmentioning
confidence: 99%
“…The FP is calculated by the total number of things wrongly detected as the malicious things divided by the total number of normal things [16][17][18]. Therefore, the FPR is defined as illustrated in Eq.…”
Section: Fprmentioning
confidence: 99%
“…The FP is calculated by the total number of nodes wrongly detected as the malicious nodes divided by the total number of normal nodes [29,30]. Therefore, the is defined as illustrated in Eq.…”
Section: Fpmentioning
confidence: 99%
“…In Fotohi et al, 27 the security protocol is based on RSA with Abnormal Sensor Detection Accuracy (ASDA‐RSA) to resist Denial‐of‐Sleep (DoSL) attack only. This protocol is vulnerable to masquerade, replay, Sybil, and secret value guessing attack and suffers from more computation and communicational overheads.…”
Section: Related Workmentioning
confidence: 99%