Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In wireless sensor networks, data aggregation plays an important role in energy conservation of sensors. However, these networks are typically deployed in hostile environments and in which privacy and data integrity are widely desired. Because of their design, wireless sensors can be easily captured. Also, nodes that perform the aggregation function are most attractive to attackers. Therefore, in...
Due to the characteristics of resource-constrained in wireless sensor networks (WSNs), energy consumption is a major concern. Data aggregation is an important method to reduce the energy consumption and communication overhead ; however, it suffers from the security problems of data integrity. In fact, designing integrity schemes for data aggregation is an imperative problem for securing WSNs. In this...
Key management is an important challenging issue in wireless sensor networks (WSN)to provide the confidentiality and authenticity for the sensitive data, which is sensed by the sensors from various fields. Various studies have focused on authentication and key establishment schemes in WSNs. In this paper, we propose a novel authentication protocol and secure key management scheme using Elliptic Curve...
As Wireless Sensor Networks (WSN) continue to grow, so does the need for effective security mechanisms. Enhancing the efficiency of these networks requires more security to provide integrity, authenticity and confidentiality of the data flowing through the network. Encryption is one of the most common tools used to provide security services for WSNs. There has been an enormous research potential in...
The Internet of things (IoT) connects a large number of smart objects that are seamlessly integrated into the information network to provide integrated services in all fields of human activity. Since IoT is vulnerable to various attacks, security and privacy are the key issues for IoT applications. In the past few years, IoT has presented a strong focus of research and different approaches have been...
Wireless Sensor Networks (WSNs) are being used for many applications ranging from mobile target surveillance to intelligent home networking. The data transmitted by those applications are sensitive. Then due to the weakness of the radio links, appropriate protection mechanisms are needed to prevent attackers from exploiting those lacks of security. In this paper we present a solution to authenticate...
Wireless Sensor Networks (WSNs) have inspired tremendous research interest in since the mid-1990s. Advancement in wireless communication and miniature electromechanical systems (MEMSs) have enabled the development of low-cost, low power, multi-functional, tiny sensor nodes that can sense the environment, perform data processing, and communicate with each other untethered over short distances. Most...
Research in the wireless sensor networks field has been plagued by difficulties in realistic simulations. These difficulties are often the result of non-realistic assumptions which need to be removed from the mathematical models. Especially, radio propagation models are often simplified and do not take into consideration irregularities such as fading, shadowing, and temporal non-stationarity. In this...
Recent advances in integrated electronic devices motivated the use of wireless sensor networks in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent events to the analysis center(s). Obviously, the sensor deployment should guarantee and optimal event detection rate...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.