The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We can apply psychological methods and behavioral science to understand the practices, techniques, processes, and skillset cyber-criminals are using nowadays for cyberattacks. We can setup honeypots to observe the techniques and methods used for attacks through logs and security settings. However, setting up a honeypot is very expensive and time consuming. So we have to work with our running systems...
Globally, mobile health (mHealth) technology could present incredible advantages to the general public, comprising of improved health care system, with less errors, reduced cost, and enhanced patient and healthcare systems commitment. To let mobile health apps and devices be safe and effective it should be regulated that it is designed, and developed properly. Then it should be implemented correctly...
In wireless sensor networks it is becoming more and more important for sensor nodes to maintain anonymity while communicating data because of security reasons. Anonymous communication among sensor nodes is important, because sensor nodes want to conceal their identities either being a base station or being a source node. Anonymous communication in wireless sensor networks includes numerous important...
Securing data in wireless sensor networks is very important because of hostile environment. And securing data is quite challenging as well because of limited resources the sensor nodes have. Many security schemes have been proposed for homogeneous sensor networks where all the sensor nodes hold similar capabilities. Recently researchers have shown that heterogeneous sensor networks can perform better...
Heterogeneous Sensor Networks are more powerful and efficient than homogeneous sensor networks. It has been shown that homogeneous sensor networks perform poorly because of routine limits and scalability. In our research, we consider to use heterogeneous topology to securely route data in a wireless sensor network. The given area of interest is initially partitioned into Voronoi clusters, where low-end...
Heterogeneous Sensor Networks are more powerful and efficient than homogeneous sensor networks. It has been shown that homogeneous sensor networks perform poorly because of routine limits and scalability. In our research, we consider to use heterogeneous topology to securely route data in a wireless sensor network. The given area of interest is initially partitioned into Voronoi clusters, where low-end...
Clustering, routing and security are essential for better performance of any sensor network. Providing inbuilt security to routing algorithms in sensor networks is essential since some of these sensor networks have applications in hostile environments. Researchers work either on a routing algorithm or on security. However, the security should be embedded to the design of a routing scheme. In this...
This paper presents an identity based pairwise post deployment key establishment scheme for heterogeneous sensor networks. The sensor network has two different types of nodes: the high end nodes and the low end nodes. A unique tree addressing scheme is used where the sensor nodes are allotted a unique ID and the nodes fill their neighbor table. They share the secret key with their neighbors for secure...
This paper presents an approach describing transmit power controlled clusters for Heterogeneous Sensor Networks (HSNs). There are two types of nodes in the network: the low-end and high-end nodes. The objective is to set a threshold limit of transmit power for low end nodes for the intra-cluster communication, and also set a limit for high end nodes for inter-cluster communication. We have tested...
The research is centered on sensor networks with two types of nodes. The low end nodes are simple and low cost, while the high end nodes are costly but provide significantly more processing power. In this type of sensor networks, the low end nodes are clustered and report to a high end node, which is turn uses a network backbone to send data to a base station. In this research we have configured a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.