The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks (WSN) have received a lot of attention recently due to their wide range of applications in military as well as civilian operations. It is a challenging work to design suitable cryptography for wireless sensor networks since the limitations of power, computation capability, and storage resources. Many schemes based on symmetric or public key cryptography have been investigated...
Based on Cheng-Liu-Wang identity-based signature scheme and Baek-Zheng pairing-based verifiable secret sharing scheme, a new secure monitoring scheme using identity-based threshold signcryption scheme for wireless sensor networks is proposed. The goal of this scheme is to provide a confidential and authenticated transmission channel for monitoring messages sent by nodes to BS over an insecure wireless...
To secure wireless sensor networks, a particularly challenging problem is how to feasibly deal with the internal attacks against the routing protocols, such as Byzantine attacks. In this paper, we proposed a secure routing a lightweight security protocol for detecting Byzantine attacks. In this paper, we develop: (1) an secure cluster header selection and clustering scheme that a source node can authenticate...
The establishment of pair-wise key between two nodes in wireless sensor network is a big challenge. We propose a protocol PWKEP including three contributions: 1) Achieve secure key exchange protocol with mutual authentication. 2) Propose a modular approach for design of secure authenticated key exchange protocols. 3) Adopt elliptic curve Diffie-Hellman key exchange and argue reasonable energy consumption...
The advent of Identity based encryption has enabled a wide range of new cryptographic solutions for wireless sensor network. In this paper, a scheme named KDBSP is given to distribute symmetry key in wireless sensor network KDBSP comes from Smart protocol based on pairing. After some analyzing, KDBSP has some advantage on storage, computation and communication by comparing with the other scheme for...
The cross-regional transitivity problem of key leak exits in the most key management protocols. It's harmful to the security of system. CUT, a new key management protocol in WSN is presented. The results of simulation show CUT can solve the cross-regional transitivity problem of key leak and is scalable.
Numerous cluster-based key management schemes have been proposed to secure sensor networks. Nevertheless, most existing schemes did not take the legitimacy of the cluster- head into consideration, which might highly vulnerable to several attacks such as sinkhole; wormhole and selective-forwarding, besides, the network should deal with an addition of new nodes and deletion of nodes being captured....
Existing secure network reprogramming protocols for wireless sensor networks (WSNs) target the efficient authentication of code packets, but none of them provide the verification of control packets which are vulnerable to Denial of Service (DoS) attacks. In this paper, we propose the secure and DoS-resistant network reprogramming scheme based on CPK (Combined Public Key) that can verify control packets...
This paper mainly proposes a new robust and energy-efficient solution for secure operation of wireless sensor networks. It motivates a new paradigm where security is based upon using parameterized frequency hopping and cryptographic keys in a unified framework to provide differential security services for wireless sensor networks.
As broad deployed of wireless sensor networks, privacy concerns have emerged as the main obstacle to success. When wireless sensor networks are used in everyday life, the privacy about monitored object' sensitive data becomes an important issue. Consequently, providing efficient data aggregation privacy protection is desirable. However, the existing technique is always energy exhausting, and does...
Wireless sensor networks (WSN) based on hexagonal mesh can be able to extend the lifetime of self-configuring systems by exploiting redundancy to conserve energy while maintaining application fidelity. However, security for topology control is scarce in wireless sensor networks based on hexagonal mesh. In this paper, STCP, an energy-effective secure topology control protocol for wireless sensor networks...
With the development of WSNs in the military and commercial fields, the security of WSNs is becoming more and more important. The security threats of wireless sensor networks (WSNs) come from not only the attacks of external attackers but also the byzantine behaviors and selfish behaviors of internal nodes. The classical security mechanisms, namely cryptography and authentication, can prevent some...
In order to solve the problems that sensor node-key leaking and adversaries make compromised nodes as their collusions to launch new attack, the paper proposed an efficient anti-collusion scheme based on elliptic curve cryptography for wireless sensor networks. In the proposed scheme, the group-key distribution strategy is employed to compute the private key of each sensor node, and the encryption...
This paper studies the fabricated report with false votes on real reports attack in wireless sensor networks. To deal with secondary attack, we propose a probabilistic voting-based scheme (PVS). On the basis of the en-route filtering scheme, PVS combines cluster-based organization, probabilistic key assignment, and voting methods. Through analysis and simulation, we demonstrate that PVS could achieve...
In recent years, short-range wireless communication becomes a hotspot in wireless industry, which can be widely used in constructing the wireless sensor network of military, industrial control, precise agriculture and medical monitoring. It will play an important role with the coming ubiquitous computing age. Focusing on LR-WPAN 802.15.4, this paper introduces its security architecture and presents...
Based on the model of resilient data aggregation in wireless sensor networks, two attack detection algorithms by means of % -testing were proposed in this paper according to clustering uniformly or not, namely the CTUC (chi-square test for uniform cluster) algorithm and CTUUC (chi-square test for un-uniform cluster) algorithm. By applying % -testing with some priori knowledge about the system, the...
Providing a suitable key establishment scheme in wireless sensor networks is challenging due to all the characteristics of these networks, such as limitations of power, computation capability and storage resources. This paper presents a new key predistribution scheme for wireless sensor networks. By applying the ID-based technique, the proposed scheme can establish a unique pair-wise between two nodes...
In wireless sensor networks, the pairwise keys shared by non-compromised nodes could be compromised, then the adversary would misuse the pairwise keys to forge message report in order to destroy secure communication or deplete the limited resource in sensor nodes. To address this issue, in this paper, an efficient mechanism is proposed to detect misused pairwise keys. Specially, an efficient verifiable...
The establishment of keys between communicating neighbor nodes in homogeneous sensor networks is a challenge due to resource constrained sensor networks. However, recent researches have indicated that the performance of the sensor networks can be substantially improved with a small percentage of more capable sensors. To achieve better performance and security, we adopt a heterogeneous sensor network...
Wireless sensor networks are confronted with unique challenges. Key distribution is one of the most challenging security problems in wireless sensor networks, and the traditional security techniques used in tradition networks cannot be applied directly. We propose CPK-based authentication protocol as the security scheme, which can achieve the key establishment and security authentication. In contrast...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.