The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sensor networks are vulnerable to false data injection attack and path-based denial of service (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme, enabling each forwarding node to check the authenticity of the received message, acts as a defense against these two attacks. To construct an efficient en-route filtering...
Wireless sensor network (WSN, Wireless Sensor Network) is a kind of autonomous network with sensor nodes. It is different from traditional RFID system that the WSN is through the distribution of sensor nodes in different locations to monitor environmental conditions. The collected data from sensor nodes were sent back to the base station for further analysis and processing to compensate the shortage...
As the networking technology greatly advanced in past decades, wireless sensor networks (WSN) have been widely deployed and utilized in various areas. Security issues on WSN devices thus draw much attention. In order to ensure the security of IEEE802.15.4 WSN and to fulfill the strict limitations of area and energy, we propose an efficient scheme for AES-CCM architecture. We implement AES-CCM by taking...
With the development of WSNs in the military and commercial fields, the security of WSNs is becoming more and more important. The security threats of wireless sensor networks (WSNs) come from not only the attacks of external attackers but also the byzantine behaviors and selfish behaviors of internal nodes. The classical security mechanisms, namely cryptography and authentication, can prevent some...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.