The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In data-centric wireless sensor networks, the malicious nodes may selectively drop some crucial data packets, which seriously destroy the network's data collection and decrease the availability of sensor services. In this paper, we present a lightweight defense scheme against selective forwarding attacks. According to characteristics of easy positioning the nodes around transmission paths in a structured...
Communication via self-organization is a practical and most common model for wireless sensor network. Its security, efficiency and cost and corresponding key management are one of the key research topics on WSN security. This paper proposes a group key management scheme for WSN based on an original self-organized structure, grid-loop. The group which we called grid-loop is constructed on distributed...
In view of the existing situation that patients' physiological information is not timely and securely acquired and medical workers is easy infected in some particular large scale medical assistance application, a feasible solution based on wireless sensor networks is proposed. In the solution, a secure network topology based on hexagonal mesh is constructed according to node locations for acquiring...
The neighborhood information has been frequently used by protocols such as routing in sensor networks. Many methods have been proposed to protect such information in hostile environments. However, these methods can only protect neighbor relations between benign nodes. A compromised node can easily circumvent them and setup false neighbor relations with sensor nodes in many places, impacting the network...
In near future, wireless sensors networks (WSN) are expected to be deployed for a vast variety of applications. For many of these applications, sensed data individually have no meaning without proper knowledge of position where the data was sensed. Although there have been proposed algorithms for localization, many of them fall short with respect to complexity, cost, security and accuracy. Some issues...
Wireless sensor networks (WSN) based on hexagonal mesh can be able to extend the lifetime of self-configuring systems by exploiting redundancy to conserve energy while maintaining application fidelity. However, security for topology control is scarce in wireless sensor networks based on hexagonal mesh. In this paper, STCP, an energy-effective secure topology control protocol for wireless sensor networks...
This paper proposes a novel hybrid cryptographic scheme for the generation of pair-wise network topology authenticated (TAK) keys in a Wireless Sensor Network (WSN) using vector algebra in GF(q). The proposed scheme is deterministic, pair-wise keys are not pre-distributed but generated starting from partial key components, keys management exploits benefits from both symmetric and asymmetric schemes...
Wireless sensor networks (WSN) have been identified as being useful in a variety of domains from the battlefield to environmental monitoring. We motivate the security problems that sensor networks face by developing a scenario representative of a circle-distributed 2-hops network model. Threats are identified to this model and a new lightweight security solution, comprised of the topology discovery...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.