2014
DOI: 10.1109/tc.2014.2345400
|View full text |Cite
|
Sign up to set email alerts
|

By-Passing Infected Areas in Wireless Sensor Networks using BPR

Abstract: Abnormalities in sensed data streams indicate the spread of malicious attacks, hardware failure and software corruption among the different nodes in a Wireless Sensor Network. These factors of node infection can affect generated and incoming data streams resulting in high chances of inaccurate data, misleading packet translation, wrong decision making and severe communication disruption. This problem is detrimental to real-time applications having stringent Quality-of-Service (QoS) requirements. The sensed dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 29 publications
0
1
0
1
Order By: Relevance
“…Thiscangiverisetoproblemspertainingtoprivacyandsafety.Theseproblematicareascomprise authenticationandauthorisation,identitymanagement,resourceaccesscontrol,securelydistributed decisionenforcementandcollaboration,qualityofsecurityandservice,sharingpolicyofinformation etc. (Premarathne,Khalil,&Atiquzzaman,2015;Yaakob,Khalil,Kumarage,Atiquzzaman,&Tari, 2015).Toresolvetheaboveissues, (Nunes,Mendonca,Nguyen,&Obraczka,2014)putforththe ideaofaresourcemanagementandaccesscontrolsystembasedonpolicythatwouldensureamong thediversifiedresourcessoughtbyusersasafepartnershipandinteroperabilitybetweenresources.…”
Section: Security and Privacy Protectionmentioning
confidence: 99%
“…Thiscangiverisetoproblemspertainingtoprivacyandsafety.Theseproblematicareascomprise authenticationandauthorisation,identitymanagement,resourceaccesscontrol,securelydistributed decisionenforcementandcollaboration,qualityofsecurityandservice,sharingpolicyofinformation etc. (Premarathne,Khalil,&Atiquzzaman,2015;Yaakob,Khalil,Kumarage,Atiquzzaman,&Tari, 2015).Toresolvetheaboveissues, (Nunes,Mendonca,Nguyen,&Obraczka,2014)putforththe ideaofaresourcemanagementandaccesscontrolsystembasedonpolicythatwouldensureamong thediversifiedresourcessoughtbyusersasafepartnershipandinteroperabilitybetweenresources.…”
Section: Security and Privacy Protectionmentioning
confidence: 99%
“…Bu gizlilik ve güvenlikle ilgili sorunlara yol açabilir. Sorunlu alanlar kimlik doğrulama ve yetkilendirme, kimlik yönetimi, kaynak erişim kontrolü, güvenli bir şekilde dağıtılmış karar yürütme ve işbirliği, güvenlik ve hizmet kalitesi, bilgi paylaşım politikası alanlarıdır [20][21].…”
Section: Introductionunclassified