Implementation of data survival in unattended Wireless Sensor Networks using cryptography

@article{Santos2010ImplementationOD,
  title={Implementation of data survival in unattended Wireless Sensor Networks using cryptography},
  author={Mateus A. S. Santos and Cintia B. Margi and Marcos A. Simpl{\'i}cio and Geovandro C. C. F. Pereira and Bruno Trevizan de Oliveira},
  journal={IEEE Local Computer Network Conference},
  year={2010},
  pages={961-967}
}
Security in Wireless Sensor Networks (WSNs) is highly dependent on the behavior of the base station. This happens because, if the network is left unattended, sensor nodes cannot offload data to the (secure) base station in real time and, thus, until the base station becomes available, adversaries can compromise some sensor nodes and selectively destroy data. In order to prevent such attacks, providing the so-called “data survival”, some strategies can be employed. In this paper, we discuss and… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.
9 Citations
32 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-9 of 9 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 32 references

TelosB datasheet

  • Crossbow
  • http://www.xbow.com/Products/Product pdf files…
  • 2008
Highly Influential
4 Excerpts

E363xA Series Programmable DC Power Supplies

  • Agilent
  • http://cp. literature.agilent.com/litweb/pdf/5968…
  • 2009
2 Excerpts

LabView

  • NationalInstruments
  • http://www.ni.com/labview/, 2009.
  • 2009
1 Excerpt

Similar Papers

Loading similar papers…