The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Unique characteristics of wireless sensor networks have made node compromise a great security challenge. An adversary can use compromised nodes to inject false data to the network, thus deceiving the sink to make false decisions. Moreover, the false data will deplete precious energy resources of en-route nodes which forward the false data to the sink. To fight against such false data injection attacks,...
Self-healing key distribution enables users in a large and dynamic group to establish session keys for secure group communication over an unreliable network. The main property of self-healing key distribution is that the users are capable of recovering lost session keys on their own, without requesting additional transmissions from the group manager. In this paper, we propose an efficient self-healing...
Self-healing key distribution enables users in a large and dynamic group to establish session keys for secure group communication over an unreliable network. The main property of self-healing key distribution is that the users are capable of recovering lost session keys on their own, without requesting additional transmissions from the group manager. In this paper, we propose a self-healing key distribution...
Self-healing key distribution enables users in a large and dynamic group to establish session keys for secure group communication over an unreliable network (e.g., wireless sensor networks). The main property of self-healing key distribution is that the users are capable of recovering lost session keys on their own, without requesting additional transmissions from the group manager. In this paper,...
Dynamics of sensor networks make security one of the top issues we should pay attention to. Sensor networks can be deployed in hostile environments where their nodes are easy to be captured or re-programmed for deleterious use by an adversary. Therefore, it is necessary to protect communications between sensor nodes through cryptographic methods. To address this, symmetric key management in wireless...
The need for efficient and secure localization is an important issue in a scalable self-organizing network. However, exiting secure solutions are not well suitable or effective for wireless sensor and actor networks (WSANs) because of the features of WSANs (e.g. node heterogeneity). In this paper, we propose a novel approach (SeLoc) to secure localization for WSAN based on DV-Hop and hidden actors...
Wireless sensor networks (WSNs) have wide applications both in military and civil fields. However, when deployed in untended/hostile area, WSNs may suffer all kinds of attacks like flooding, sinkhole, etc. To apply WSNs more practically and wildly, some secure countermeasures must be deployed in WSNs. In this paper, we design a kind of firewall scheme, which is based on mobile agent, to isolate the...
Frequency-hopping is a kind of secure solution in wireless communication field. We propose two novel mechanisms based on differential frequency-hopping to prevent those attacks like jamming, eavesdropping, tampering, etc. in wireless sensor networks (WSN). We also present the deployment scheme of our secure solutions. The analysis in this paper indicates that these two solutions have a number of good...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.