Learn More
Wireless sensor networks are a promising future of many commercial and military applications. However, these networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional(More)
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sensor networks, providing a right key management is challenging. Traditional key management schemes based on trusted third parties like a certification authority are impractical due(More)
– Wireless sensor networks are being used in many commercial and military applications to collect real time and event driven data. Deployment nature of sensor networks makes them vulnerable to security threats. Due to the resource limitations traditional security measures are not enough to protect sensor nodes. Research in sensor network security domains(More)
Inherent resource limitation nature of wireless sensor networks poses unique security challenges. Cryptography is not enough and efficient to secure wireless sensor networks; it can not prevent malicious nodes and tunneling of messages to wormholes and sinkholes. In this paper we propose a monitoring mechanism to detect malicious nodes; the proposed(More)
Data aggregation in wireless sensor networks (WSN) is a rapidly emerging research area. It can greatly help conserve the scarce energy resources by eliminating redundant data thus achieving a longer network lifetime. However , securing data aggregation in WSN is made even more challenging, by the fact that the sensor nodes and aggregators deployed in(More)