The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of proxies is commonplace in today’s MANETs, where they are used for a huge variety of network services. However the main problem of using proxies is that the end-to-end nature of the communication is broken. This leads to some severe security problems. One of the main questions that arise is how content caching by intermediaries can be done when end-to-end security is required. In...
We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distributing rekeying messages and specify techniques for joining and leaving a group. Access control in multicast system is usually achieved by encrypting the content using an encryption key, known as the group key (session...
Using polynomial-based key predistribution in distribution sensor networks for reference, this paper presents an efficient key predistribution scheme for Ad hoc networks: a multigrid-based key predistribution scheme. In this scheme we put forward the concept of multi-grid on which our key predistribution scheme is upbuilt, and the first time threshold scheme is introduced into the process of key transfer...
Recently, position-based routing has proven to be a scalable and efficient way for packet routing in mobile ad hoc networks. To enable position-based routing, a node must be able to discover the location of the intended destination node. This can typically be accomplished by a location service. By far there have been many efficient location service algorithms such as the DREAM, RLS, Homezone, GLS,...
The framework of security communication among sensor nodes is the most important aspect and a basic research field of securing Wireless Sensor Networks. Many techniques have been developed recently to establish keys in sensor networks. Most of them are based on cluster topology. Based on the novel loop-topology, this paper proposes a new key establishment and rekeying scheme. The loop-based scheme...
To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process by which data sent from sensors to the BS are little-by-little processed by some nodes called aggregator nodes. Aggregators collect data from surrounding nodes and produce a small sized output, thus preventing that all nodes...
In this paper, we investigate the use of Aspect-Oriented Programming (AOP) [13] in the domain of Mobile Ad-hoc NETworks (MANETs). More precisely we study the availability issues in Proactive routing protocols. This paper classifies the different possible attacks and examines the countermeasures to ensure availability. Our approach is based on a detection-reaction process. The reasoning followed by...
Deploying wireless LANs (WLAN) at large scale is mainly affected by reliability, availability, performance, and security. These parameters will be a concern for most of managers who want to deploy WLANs. Most importantly, the security issue became the predominant factor in WLAN design. Different Intrusion detection mechanisms have been addressed in research papers, but with little being focused on...
In this paper we discuss the uprising problem of public key revocation. The main problem in key revocation includes the relatively large memory and communication required to store and transmit the revoked list of keys. This problem becomes serious as the sensor network is subjected to several constraints. In this paper, we introduce several efficient representation mechanisms for representing a set...
Improvements in technology introduce new application for sensor networks. As Mission-critical applications are deployed in distributed wireless sensor networks, security issues arise. They are facing tremendous challenges: wireless communication environment (usually in hostile areas), lack of infrastructure support, inability of predicting network topology and limited resource associated with nodes...
As the WSN multi-media applications go deep into the military, monitor and other data-sensitive areas, stream data have become the main data processing objects instead of scalar data in WMSN. Because of the difference between the application environments and data features of stream data and scalar data, traditional secure routing for scalar data is not fit for stream data. In this paper, SOAR, a secure...
The growing popularity of wireless sensor networks has brought increasing attention to many security issues for such networks. In these security issues, key management is one of the most challenging and in dire need of solving problems. A lot of research has been mainly concentrated on key management for homogeneous wireless sensor networks. However, such homogeneous networks could restrict them to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.