Show simple item record

dc.contributor.authorNabaasa, Evarist
dc.contributor.authorLin, Yaping
dc.date.accessioned2019-12-19T10:50:09Z
dc.date.available2019-12-19T10:50:09Z
dc.date.issued2013
dc.identifier.citationEvarist, N., & Lin, Y. (2013). Candidate Base Stations a Security Solution For Compromised Base Stations In Wireless Sensor Networks.en_US
dc.identifier.urihttp://ir.must.ac.ug/xmlui/handle/123456789/377
dc.description.abstractWireless sensor networks heavily rely on base stations for data processing and routing within the network itself and the outside world. Considerably less attention has been put on the security of base stations in comparison with sensor nodes, simply because the base stations are expected to be secure enough not to be attacked or even be compromised. In this research paper we propose, Candidate Base Stations, base station failure detection, in which the sensor network should be able to automatically and promptly resort to a candidate base station, which takes over the roles of a compromised base station. Our strategy of candidate base stations, tries to ensure presence of the same number of base stations on the network even after some have been compromised. With candidate base stations, base station security is more guaranteed, our experimental results indicate a greater secure network with this scenario.en_US
dc.description.sponsorshipHunan Universityen_US
dc.language.isoenen_US
dc.publisherCollege of Computer and Communication, Hunan University, P. R. Chinaen_US
dc.subjectBase stationen_US
dc.subjectWireless sensor networksen_US
dc.subjectCandidate base stationen_US
dc.subjectSensor nodeen_US
dc.subjectNs-2en_US
dc.titleCandidate Base Stations a Security Solution For Compromised Base Stations In Wireless Sensor Networksen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record