The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Wireless sensor networks (WSN's), various tiny wireless sensor nodes or motes collect the data from the surrounding areas, where they are deployed and forward the same towards the gateway. Various pieces of information, such as occurrences of various events in the field and associated aggregate values need to be extracted from the data collected by these motes in an end-to-end WSN solution. Furthermore,...
Wireless sensor networks facilitate real-time data processing in many applications such as intrusion detection and military surveillance. These applications inherently demand a high level of security. Public key cryptographic techniques such as Elliptic Curve Cryptography (ECC) provide a flexible interface to ensure security, requiring no pre-distribution of keys. However, ECC is very compute-intensive,...
In modern radio communications systems Digital Down Converters (DDC) play a significant role to receive a transmitted signal. The transmitted signal, which is usually a bandpass signal riding over a high intermediate frequency gets sampled at a very higher rate than the ideal Nyquist rate due to the phenomenon of bandpass sampling. Hence a Digital Down converter is used to lower the sampling rate,...
Advancements in wireless networking and embedded systems technology have given rise to Wireless sensor networks (WSN). WSNs promise ubiquitous data collection and processing for variety of commercial and military applications. Recently proposed Internet of things concept utilises WSN as a medium connecting physical world to virtual world. Practical realization of these applications is possible only...
Traditionally, RSA is being used for authentication and key exchange for symmetric key cryptography (SKC). Improved network security demands forward secrecy also. Even though, RSA, a widely used key exchange approach can not provide forward secrecy, the same can be achieved by making used Elliptic Curve Diffie-Hellman Ephemeral (ECDHE) technique for SKC and RSA for the purpose of authentication. However,...
Wireless sensor networks (WSN's)are highly resource constrained and require energy efficient and strong cryptographic techniques to ensure secure connectivity. Elliptic Curve Cryptography (ECC) is a very popular public key cryptography technique due to the extremely complex and difficult Elliptic Curve Discrete Logarithm Problem (ECDLP), it relies upon. In this paper, a technique for speeding up point...
Wireless Sensor Networks (WSN's) are resource constrained networks, demanding energy efficient cryptographic algorithms in order to extend security to them. When compared with the popular RSA algorithm, Elliptic Curve Cryptography (ECC) offers similar level of security with smaller key size requirements. An efficient implementation of ECC heavily relies on the scalar multiplication operation. An efficient...
Wireless sensor networks (WSN's) rely on various resource constrained nodes with limited energy, range, memory and computational power it is necessary to conserve battery energy so as to extend the life time of the given WSN deployment. In any WSN application measured data is gathered at regular intervals and the same is sent to the Base station (BS) by using neighbouring nodes. By forming clusters...
Wireless Sensor Networks (WSN's) are being widely used in various civilian and military applications. In certain WSN applications, the data among the nodes and the Base Station (BS), needs to be exchanged in a secure manner. The encryption and decryption operations over the data involve additional energy overhead. Hence, it is required to use a security model, which offers security with less computational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.