The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, Wireless Sensor Networks (WSNs) have been employed in many real-world applications that greatly improve our life. Therefore, security in WSNs is a challenging task due to inheritance limitations of sensors and it becomes a good topic for researchers. In this work, we focus at secure hierarchical routing protocols in wireless sensor networks and represent selected approaches which focusing...
Wireless Sensor Network (WSN) is a collection of sensor nodes capable for sensing instantaneously. WSNs are widely deployed in hostile environment on ad-hoc basis. Routing protocols are used to discover a suitable route among sensor nodes and transfer sensed data from one node to another node. Several routing protocols are developed and configured according to their characteristics. Ad-hoc nature...
The sensor nodes are independent and work as sender, receiver and intermediate node in Wireless Sensor Network (WSN). The sensor nodes are forming the small network in which the one or more sender is sending data to one destination/s through intermediate nodes or sending information to Base Station (BS). The information collect by base station is further analyzed. The nodes are also static or mobile...
Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks thus offering secure routing of data traffic...
Wireless Sensor Network (WSN) is a wireless network consists of large number of sensor nodes. Routing protocols are used for communication in the network. Routing protocols discover the appropriate path to transmit the data and maintain the routes in the network. Many routing techniques in WSNs have been proposed. But without security, the use of these protocols becomes limited. Providing a secure...
Recent technological advancements in the field of nanotechnology have increased the computation power of the wireless nodes while adhering to the energy constraints. This has made the use of the Wireless Sensor Networks (WSNs), more widespread, used in applications such as area monitoring, industrial monitoring, vehicle detection or military monitoring. Sensor nodes have made it possible to collect...
WSNs are multihop networks, which depend on the intermediate nodes to relay the data packet to the destination. These nodes are equipped with lesser memory, limited battery power, little computation capability, small range of communication and need a secured and efficient routing path to forward the incoming packet. In this paper, we propose a secure cluster based multipath routing protocol (SCMRP)...
Wireless Sensor Networks are gaining popularity due to the fact that they offer low-cost solutions for a variety of application domains. However, these networks are highly susceptible to attacks, due to both the open and distributed nature of the network, as well as the limited resources of the nodes, which dictate the implementation of sophisticated security frameworks. Trust-aware routing is an...
The exactness of sensed data transmission is essential for wireless sensor networks(WSN) applications. Based on clustering WSN architecture, a secure routing protocol with intrusion detection is hereby proposed, wherein an energy prediction model for nodes is used to detect attacks in cluster head election phase, and the key management technique is applied to stage of cluster formation to ensure security...
Much more attention has been attracted in WSN (Wireless Sensor Network) recently. The problems of low energy consumption and high security of WSN are required to solve. In this paper, we propose a security mechanism based on LEACH routing protocol against Sybil attack. The mechanism is set to start up Sybil attack detection policy based on RSSI (Received signal strength indicator) when the cluster-heads...
Wireless Sensor Networks (WSNs) use tiny, inexpensive sensor nodes with several distinguishing characteristics: they have very low processing power and radio ranges, permit very low energy consumption and perform limited and specific monitoring and sensing functions. However, its security becomes an issue because in WSNs, there is virtual communication by passing the data through sensor via internet...
The complexity and number of interconnected elements comprising today's networks have stressed the need for autonomic computing techniques. This need is even bigger in wireless sensor networks, because sensor nodes should work continuously without operator intervention, i.e. have self-organiztaion and self-configuration algorithms. The first action that a wireless sensor network should do is to establish...
As wireless sensor networks (WSNs) are being developed for a wide range of application fields of real-time monitoring and control, a design overview seems important so as to investigate alternative communication aspects while treating the WSN as a whole system. As applications become more demanding the need to consider also deployment constraints and application particularities on top of the commonly...
Security in wireless ad hoc network (WAN) is very important issue. Due to dynamic topology and mobility of nodes, Wireless Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless networks. Nodes of Wireless Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing communication...
The broadcast is the important communication mode. As a new data coding method, the linear network coding can improve the data throughput of the broadcast, decrease the energy consumption of the node and reduce the data delay. How to combine the linear network coding with the broadcast in WSN in security has become the hot issue. In the paper, we introduce two parts of our research. Firstly we present...
In wireless sensor networks (WSNs), message security is an important concern. The protection of integrity and confidentiality of information and the protection from unauthorized access are important issues. However, due to factors such as resource limitations, absence of centralized access points, open wireless medium and small size of the sensor nodes, the implementation of security in WSNs is a...
Wireless sensor networks (WSN) are practical implementations of distributed computing ad-hoc wireless networks. Typically empowered with scarce energy resources and limited computing power, they are mainly used for in situ data acquisition and monitoring of the deployment area. As such, they are susceptible to various forms of jamming, at the physical and data link layer. Of special interest are the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.