dc.contributor.author | Nabaasa, Evarist | |
dc.contributor.author | Lin, Yaping | |
dc.date.accessioned | 2019-12-19T10:50:09Z | |
dc.date.available | 2019-12-19T10:50:09Z | |
dc.date.issued | 2013 | |
dc.identifier.citation | Evarist, N., & Lin, Y. (2013). Candidate Base Stations a Security Solution For Compromised Base Stations In Wireless Sensor Networks. | en_US |
dc.identifier.uri | http://ir.must.ac.ug/xmlui/handle/123456789/377 | |
dc.description.abstract | Wireless sensor networks heavily rely on base stations for data processing and routing within the network
itself and the outside world. Considerably less attention has been put on the security of base stations in
comparison with sensor nodes, simply because the base stations are expected to be secure enough not to be
attacked or even be compromised. In this research paper we propose, Candidate Base Stations, base station
failure detection, in which the sensor network should be able to automatically and promptly resort to a
candidate base station, which takes over the roles of a compromised base station. Our strategy of candidate
base stations, tries to ensure presence of the same number of base stations on the network even after some
have been compromised. With candidate base stations, base station security is more guaranteed, our
experimental results indicate a greater secure network with this scenario. | en_US |
dc.description.sponsorship | Hunan University | en_US |
dc.language.iso | en | en_US |
dc.publisher | College of Computer and Communication, Hunan University, P. R. China | en_US |
dc.subject | Base station | en_US |
dc.subject | Wireless sensor networks | en_US |
dc.subject | Candidate base station | en_US |
dc.subject | Sensor node | en_US |
dc.subject | Ns-2 | en_US |
dc.title | Candidate Base Stations a Security Solution For Compromised Base Stations In Wireless Sensor Networks | en_US |
dc.type | Article | en_US |