Learn More
In sensor networks a large number of distributed sensors collaborate to deliver information to the sinks. Such scenario assumes trust between sensor nodes. However, sensors may fail or be compromised (in military operations) in a way that renders them misbehaving. In this work we target a misbehavior model in which a misbehaving node participates in routing(More)
In data-centric sensor networks, where data processing and transfer are oblivious to node IDs, conventional node-based security models are not suitable. We introduce the novel concept of secure locations to address non-cooperative and malicious behavior in location-aware sensor networks. Our architecture also introduces a scalable <i>trust-based routing</i>(More)
In data-centric sensor networks, where data processing and transfer are oblivious to node IDs, conventional node-based security models are not suitable. We introduce the novel concept of secure locations to address non-cooperative and malicious behavior in location-aware sensor networks. Our architecture also introduces a scalable trust-based routing(More)
This paper introduces a new algorithm for the formation of trustworthy route from source node to Base Station (BS) for secure routing of messages in Wireless Sensor Networks (WSNs). This algorithm process the information given by the Trust dependent Link State Routing Protocol which is improved version of our Routing Protocol presented in [1] Direct Trust(More)
  • 1