The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The location estimation of sensor nodes is a fundamental and essential issue for wireless sensor networks (WSNs), because the gathered data is meaningful only when the location information of the sensor nodes is known. In this paper, we proposed a novel localization algorithm. In the proposed scheme, we first estimate the location of sensor nodes using Convex Position Estimation (CPE), and then refine...
Key management in sensor networks has become a challenging issue in the design and the development of secure wireless sensor networks since asymmetric cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes are vulnerable to physical capture. In this paper, we present a new key management scheme using sub key pool to enlarge the size of key pool. With...
Broadcast authentication is a critical security service in wireless sensor networks (WSNs). However, due to resource constrains of sensor nodes, providing authentication mechanism for broadcast message is difficult. ??TESLA is a lightweight broadcast authentication protocol, which use a one-way hash chain and the delayed disclosure of keys to provide the authentication service. However, it suffers...
Key management in wireless sensor networks is a challenging problem because public key cryptosystems are unsuitable for using in resource constrained sensor nodes, and the nodes could by physically compromised by an adversary. For the existing key pre-distribution schemes, as the number of compromised nodes increasing, the fraction of affected pairwise keys will increase quickly. As a result, a small...
Key management in sensor networks is the core security protocols for wireless sensor networks (WSNs) in the hostile environment. Sensor nodes have highly constrained resource like limited battery power, memory, processing capabilities, etc. These limitations make infeasible to apply traditional key management techniques such as public key cryptography in the WSNs. For the existing key pre-distribution...
Broadcast authentication is an essential security service in wireless sensor networks, as it allows a sender to broadcast messages to multiple nodes in an authenticated way. This paper propose a light-weight, scalable broadcast authentication scheme over a long period of time. Instead of using multi-level key chains as in multilevel ??TESLA, the scheme uses multiple short key chains to replace one...
Localization is an important problem in wireless sensor networks (WSNs), since location information is widely requested in various location-dependent applications. As one of the range-free localization algorithm DV-Hop, a well known localization algorithm, can be simply implement in real WSNs. To improve the accuracy of localization, this paper proposes an improved DV-Hop algorithm. The proposed algorithm...
Wireless Sensor Networks (WSNs) have received academia research attention at present. The energy-constrain sensors in wireless sensor networks operate on limited batteries, so it is a very important issue to use energy efficiently and reduce power consumption. Most recent routing protocols tend to find the minimum energy cost path to lower energy usage for all routing paths, thus, they may lead to...
Key agreement is paramount for wireless sensor networks (WSNs) security. Many key pre-distribution schemes have been developed to establish pair wise keys for WSNs. In WSNs, node capture attack is the most serious attack. And existing scheme can not offer strong resilience against node capture attack. In order to improve the resiliency of against sensor nodes capture, this paper proposes an improved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.