Su Man Nam

Learn More
Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports(More)
In a wireless sensor network, various attacks such as the false injection attack, easily occur by malicious attackers. This attack drains the finite energy resources of each node to destroy functions of the sensor network. SEF (statistical en-route filtering scheme) was proposed to probabilistically detect the false reports in intermediate nodes while(More)
False report injection attacks and false vote injection attacks can be perpetrated easily by malicious attackers on the application layer in a wireless sensor network. These attacks drain the lifetime of the sensor nodes and prevent the forwarding of legitimate reports in the sensor network. A probabilistic voting-based filtering scheme (PVFS) was proposed(More)
In wireless sensor networks, adversaries can easily compromise sensors because the sensor resources are limited. The compromised nodes can inject false data into the network injecting false data attacks. The injecting false data attack has the goal of consuming unnecessary energy in en-route nodes and causing false alarms in a sink. A bandwidth-efficient(More)
In wireless sensor networks, adversaries can harm the sensor nodes by launching attacks such as the false report injection and the false vote injection. These attacks drain finite energy resources and drop legitimate event information in the sensor network. A probabilistic voting-based filtering scheme (PVFS) detects fabricated votes at the verification(More)
An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple attacks through compromised nodes, such as false vote injection attacks and false report injection attacks. The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report injection attack tries to drain the(More)
Wireless sensor networks are easily compromised by an adversary, such as fabricated with false votes attacks and false votes on real reports attacks. These attacks generate false data to drain the energy resource of sensors and interrupt the inflow of a real report. PVFS was proposed to detect them by verifying votes in the real report. When a real event(More)