• Nenhum resultado encontrado

Intrusion Tolerant Routing with Data Consensus in Wireless Sensor Networks

N/A
N/A
Protected

Academic year: 2019

Share "Intrusion Tolerant Routing with Data Consensus in Wireless Sensor Networks"

Copied!
144
0
0

Texto

Loading

Imagem

Figure 2.1: Stack for WSN Software Support
Figure 2.2: Summary of the attacks analysed in the following sections
Figure 2.3: HELLO flood attack.
Figure 2.5: Wormhole attack.
+7

Referências

Documentos relacionados

Then the routing paths are selected by connecting all the cluster head nodes using the minimum spanning tree with degree constraint that minimizes the energy consumption for

This phase discusses about the Conjugative sleep scheduling scheme in order to efficiently compute routing for the localized energy levels in wireless sensor networks.

In Wireless sensor network, whenever an event is detected, then the data related to the event need to be sent to the sink node (data collection node). While forwarding the data

As soon as communication starts in wireless mesh networks than a session is develop while routing protocol detects every possible path to reach the target AP after detecting the

In this routing protocol, each mesh router rapidly finds out multiple paths based upon hop count metric to the Internet gateways by routing protocol designing.. Each mesh

In this paper, we have proposed a new technique to distribute the role of cluster head among some of the wireless sensor nodes based on their residual

The work presented in this paper lays the foundation for devising an efficient query driven routing protocol for subsurface exploration, using the deployment strategy suggested in

As seen from the simulation results in LEACH R, transmissions to the base station (high energy), takes place only from the R nodes which are selected from