The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
Vehicular Ad hoc NETworks (VANETs) as the basic infrastructure can facilitate applications and services of connected vehicles (CVs). Cognitive radio (CR) technology is an effective supplement and enhancement for VANETs. It can reduce the impact of deficiency of spectrum resource in VANETs. Although CR-VANETs can utilize the unused licensed spectrum effectively, the distributed nature of CR-VANETs...
With the goal of accomplish the ubiquitous intelligence in social life, Cyber-Physical Systems (CPS) are getting growing attentions of researchers and engineers. However, the complexity of computing and physical dynamics bring a lot of challenges in the development of CPS, such as integration of heterogeneous physical devices, system verification, security assurance, and so on. A general or unified...
An Unattended Wireless Sensor Network (UWSN) collects the sensing data by using mobile sinks (MSs). It differs from the traditional multi-hop wireless sensor networks in which unbalanced traffic makes the sensors close to the base station deplete their power earlier than others. An UWSN can save the battery power and prolong the network lifetime. Unfortunately, MSs would be given too much privilege...
In contrast to traditional networks, Wireless Sensor networks (WSN) are more vulnerable to attacks such as DOS, eavesdropping, tampering, node compromise, wormhole and Sibyl. To give security protection for WSN, many attack prevention and detection methods were proposed. As the second line of defence, Intrusion Detection can resist attacks under cryptography technologies are unavailable, and provide...
Emerging cooperative MIMO communication is a promising technology in improving communication quality for wireless sensor networks. However, the security problems inherent to cooperative communications also arise. In this paper we investigate the situation where some of the cooperative nodes are compromised and try to corrupt the communications by sending garbled signals. To combat the compromised...
Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. When wireless sensor networks are deployed in a hostile terrain, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the inherent resource limitations of sensor nodes, existing...
In data-centric wireless sensor networks, the malicious nodes may selectively drop some crucial data packets, which seriously destroy the network's data collection and decrease the availability of sensor services. In this paper, we present a lightweight defense scheme against selective forwarding attacks. According to characteristics of easy positioning the nodes around transmission paths in a structured...
In view of the existing situation that patients' physiological information is not timely and securely acquired and medical workers is easy infected in some particular large scale medical assistance application, a feasible solution based on wireless sensor networks is proposed. In the solution, a secure network topology based on hexagonal mesh is constructed according to node locations for acquiring...
In this paper, we present a provably secure routing protocol for wireless sensor networks, called S-SPIN (Secure-SPIN), that is a security extension of SPIN. The MAC scheme is introduced to guarantee the correctness and integrity of the messages. And we prove that under the formal security framework proposed by Acs et al, by using a mathematically rigorous proof technique, S-SPIN is secure if the...
This article puts forward a method to access the data and analyzed results from the monitoring system of environment based on WSN with the B/S mode. It resolves the problem of low speed of page refresh with Ajax. The experiment shows that the partial refresh feature of Ajax can make it possible for the users to get access to the data and analyzed results easily through the browser, and experience...
Wireless sensor networks (WSN) based on hexagonal mesh can be able to extend the lifetime of self-configuring systems by exploiting redundancy to conserve energy while maintaining application fidelity. However, security for topology control is scarce in wireless sensor networks based on hexagonal mesh. In this paper, STCP, an energy-effective secure topology control protocol for wireless sensor networks...
In this paper, we investigate the advantages of applying random network coding in sensor networks for security purpose. In particular, the problem of constructing a secure multi-path in wireless sensor networks is considered. However, unlike previous wiretapping scenarios, where the threat is posed by external wiretappers, we approach the security from an internal angle: all nodes comply with the...
Wireless sensor nodes have restricted computational resources, and are always deployed in a harsh, unattended or hostile environment. Therefore, network security represents a challenging task. This work presents a public-key based pre-distribution scheme with time-position nodes for simultaneous exchange of secure keys. The proposed defend attack and key management mechanism for sensor network applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.