Article | 05-September-2013
Sensor nodes may be deployed in hostile environments. An adversary may compromise the sensor nodes and inject false data into the network, which wastes scarce energy resources of the forwarding nodes. Existing schemes can effectively resist false data injection, but most of them do not consider the identifiers (IDs) attack, the en-route nodes check only the Message Authentication Codes (MACs) and do not verify the nodes identifiers (IDs) of the endorsing reports. In this paper, we propose a
Zhiming Zhang,
Xiaoyong Xiong,
Jiangang Deng
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 4, 1637–1652
Research Article | 01-September-2017
M. Anto Bennet,
G. Vijayalakshmi,
P. Shenbagavalli,
M. Vijayalakshmi,
S. Saranya
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 426–445