2009
DOI: 10.3844/ajeassp.2009.494.500
|View full text |Cite
|
Sign up to set email alerts
|

Priority and Random Selection for Dynamic Window Secured Implicit Geographic Routing in Wireless Sensor Network

Abstract: Problem statement: Sensor nodes are easily exposed to many attacks since it were deployed in unattended adversarial environment with no global addressing and used for critical applications such as battlefield surveillance and emergency response. While the sensor also needs to act as a router to relay a message to a required recipient, then this increased the vulnerabilities to a network layer. However, existing security mechanisms are not permissible to be fitted directly into any sensor network due to constra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(29 citation statements)
references
References 12 publications
0
29
0
Order By: Relevance
“…DWSIGF provided a variable time between 0 to 5 ms. This made the protocol spontaneous and attacker cannot determine the duration of the CTS timer, thus making it less susceptible to attack and even better than SIGF in the case of CTS rushing attack (Hanapi et al, 2009). However its behavior is non-predictable and in some instances the time might not be enough to favor replies to ORTS signal which subsequently result in retransmission.…”
Section: Jcsmentioning
confidence: 99%
See 3 more Smart Citations
“…DWSIGF provided a variable time between 0 to 5 ms. This made the protocol spontaneous and attacker cannot determine the duration of the CTS timer, thus making it less susceptible to attack and even better than SIGF in the case of CTS rushing attack (Hanapi et al, 2009). However its behavior is non-predictable and in some instances the time might not be enough to favor replies to ORTS signal which subsequently result in retransmission.…”
Section: Jcsmentioning
confidence: 99%
“…Neighbors within the broadcast range (60° sextant) considered eligible to forward the message. On receiving the signal, A CTS response timer is initiated which on expiry, a CTS packet is sent and the data is transferred from the ORTS sender in a DATA message after which an ACK signal is sent to acknowledge the received data (Hanapi et al, 2009;Wood et al, 2006). This same sequence of operation is performed by DWSIGF communication process.…”
Section: Dwsigf and Sigfmentioning
confidence: 99%
See 2 more Smart Citations
“…Among the area affected by DoS attacks are electronic information systems (Curran and Nichols 2005) and wireless sensor network (Hanapi et al, 2009).…”
Section: Distributed Denial Of Servicementioning
confidence: 99%