SASTRA University
Computer Science Engineering
Hiermit erkläre ich, dass ich die vorliegende Arbeit, mit Ausnahme der in ihr ausdrücklich genannten Hilfen, selbstständig verfasst habe.
Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network applications demand an effective, light, flexible algorithm for internal... more
Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones,... more
We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks,... more