Su Man Nam

Learn More
Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports(More)
False report injection attacks and false vote injection attacks can be perpetrated easily by malicious attackers on the application layer in a wireless sensor network. These attacks drain the lifetime of the sensor nodes and prevent the forwarding of legitimate reports in the sensor network. A probabilistic voting-based filtering scheme (PVFS) was proposed(More)
In wireless sensor networks, adversaries can easily compromise sensors because the sensor resources are limited. The compromised nodes can inject false data into the network injecting false data attacks. The injecting false data attack has the goal of consuming unnecessary energy in en-route nodes and causing false alarms in a sink. A bandwidth-efficient(More)
An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple attacks through compromised nodes, such as false vote injection attacks and false report injection attacks. The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report injection attack tries to drain the(More)
Wireless sensor networks are easily compromised by an adversary, such as fabricated with false votes attacks and false votes on real reports attacks. These attacks generate false data to drain the energy resource of sensors and interrupt the inflow of a real report. PVFS was proposed to detect them by verifying votes in the real report. When a real event(More)
Nodes are easily exposed from generated attacks on various layers because they compose simple functions in sensor networks. The false data injection attack drains finite energy resource in a compromised node, and the false HELLO flood attack threatens constructed routing paths in an adversary node. A localized encryption and authentication protocol (LEAP)(More)