The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A multi-cluster-head based clustering routing algorithm is researched and realized in order to achieve better balance the energy consumption of wireless sensor network nodes as well as promote the stability and extend the service life of the network. By taking cluster as the basic unit, it divides the wireless sensor network into multiple clusters, each of which includes a main cluster head node,...
With the related applications of wireless sensor networks getting into our lives quickly, the research of WSN is growing more and more necessary. The most significant problem which threatens the successful deployment of sensor systems is privacy, there are many protocols providing the security of news content for the WSNs. However, due to the open feature of sensor networks, context information is...
Key management for wireless sensor networks has been a challenging research topic since stringent resource constraints make the key pre-distribution schemes difficult to implement. This paper proposes a novel key pre-distribution method based on trivariate symmetry polynomial and hash function. First, the base station assigns some random numbers to each node using BIBD, then two nodes calculate the...
To achieve security in wireless sensor networks, it is needed to encrypt and authenticate message sent between sensor nodes. Key management is a very critical problem. However, as sensor nodes are resource-constrained, achieving key agreement is nontrivial. In this paper, we propose a key pre-distribution scheme based on multiple key spaces. The scheme combines the advantages of BIBD and Blom. Detailed...
In wireless sensor networks (WSNs), massive amounts of nodes, volatile network topology and limited resources (such as energy, computing power, storage, bandwidth, and so on) make the traditional security scheme cannot be directly applied to WSNs. Identity-based encryption (IBE) is becoming a hot research topic since it does not need PKI and complicated certificate operations. In this paper, a novel...
As studies to date have demonstrated that the clock skew of every physical device differs and so is suitable for device identification in network communications, the fact that any adversary can easily produce a fake clock skew by altering the timestamp of the sent packets remains a concern. This study contributes to this issue by realizing a replication attack of an indistinguishable fake clock skew...
In wireless sensor networks, small-world model can optimize the network performances, such as small average path length of the networks and high clustering coefficient. However, the links between nodes are determined by the radio range. Hence, many methods based on heterogeneous WSN were proposed. In this paper, a novel approach is proposed to create a small-world model for the homogeneous WSNs. In...
This research aims to complement security vulnerability of Flooding Time Synchronization Protocol (FTSP), which is currently one of the most sophisticated approaches for time synchronization in wireless sensor networks (WSNs). FTSP has advanced features like implicitly dynamic topology and high accuracy time, but its original design does not consider security issues. In order to defend against attacks...
Key management poses a main concern for security operation in wireless sensor networks. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors in homogeneous sensor networks. In recent, some research has demonstrated that heterogeneous sensor networks can achieve better performance in security than homogeneous networks. In this paper we propose a key- chain...
Cardiovascular disease remains the main cause of death, and great efforts are spent on the design of ECG body sensors these years. Essential components such as analog frontend and wireless transceivers have been integrated on a compact IC with micro-Watt power consumption. To provide timely warning against the fatal vascular signs, based on the Chaotic Phase Space Differential (CPSD) algorithm, on-sensor...
Node identification is one of the most important issues to wireless sensor network security. Current approaches use cryptographic authentication and certification tools to ensure the node identification, while this paper introduces an intuitive method to identify a node by measuring its clock skew. This method is based on our observation that every sensor node has a unique clock skew value that is...
In wireless sensor networks, it is an important task to periodically collect data from an area of interest for time-sensitive applications. The sensed data must be gathered and transmitted to a base station for further processing to meet the end-user queries. Since the network consists of low-cost nodes with limited battery power, it is a challenging task to design an efficient routing scheme that...
In wireless sensor networks, it is an important task to periodically collect data from an area of interest for time-sensitive applications. The sensed data must be gathered and transmitted to a base station for further processing to meet the end-user queries. Since the network consists of low-cost nodes with limited battery power, it is a challenging task to design an efficient routing scheme that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.