The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent advances in the relevant technologies of contemporary wireless sensor nodes has motivated a growth in the deployment of wireless sensor networks (WSN) for commercial, non-commercial and research applications. In the aforementioned applications, it is often prudent to frustrate unauthorised wireless communications with WSN nodes. A symmetric cryptographic technique referred to as Authenticated-Encryption...
While security is an important feature in wireless sensor networks, but the energy constraints of sensor nodes should also be considered. In this work, the energy expenditure of such authentication protocol has been investigated respect to TelosB energy consumption behavior. Data Aggregation and Authentication protocol (DAA) integrates false data detection with data aggregation and confidentiality...
To improve the security of wireless sensor network (WSN), this paper designed a dynamic immunity-based intrusion detection model for WSN. The model mainly achieved the generation of detector and antigen detection. In the process of antigen detection, the self model class was introduced to filter self element and reduce the workload of the detector. In the process of detector generation, the model...
The following topics are dealt with: communication network; communication service; cognitive radio; protocols; security; ad hoc network; mesh network; all optical network; cellular network; network coding; resource allocation; wireless sensor network; and network performance.
We describe a novel Distributed Key Establishment (DKE) protocol in Disruption (Delay) Tolerant Location Based Social Wireless Sensor and Actor Networks (DTLBS-WSAN). In DKE, we propose that sensor nodes use neighboring signatures to establish their keys. Pre-distributed keys are used by actor nodes to strengthen communication security. We show that nodes can get guaranteed security when actors are...
The security aspect of wireless sensor networks has taken the attention of numerous researchers in the past several years. It has recently been proven that public keys are now feasible in wireless sensor networks but still consume a lot of processing time and memory. In this paper we propose the use of public keys based on ECC to exchange symmetric keys that will be used to encrypt communications...
This paper presents a new efficient implementation approach of elliptic curve cryptosystem based on a novel finite field multiplication and a high performance scalar multiplication algorithm for wireless network authentication. In this new finite field multiplication, CLNZ sliding window method is used on the signed-digit multiplier in order to reduce the multiplication steps. In addition, in scalar...
Sensor networks have the potential to allow users to “query the physical world” by querying the sensor nodes for an aggregate result. However, a concern with such aggregation is that a few corrupt nodes in the network may manipulate the results that the querier sees. There has been a substantial amount of work on providing integrity for sensor network computations. However to the best of our knowledge,...
In this paper, we propose a novel remote user authentication scheme based on the geometric property of the Euclidean plane for wireless networks. We combine a user's biometrics information with a password to enhance the level of the security. We demonstrate that the proposed scheme satisfies the following security properties: anonymity, resistance to forgery attacks and replay attacks, fast error...
In recent years the spectrum of wireless sensor network applications has grown dramatically. Sensor nodes range from very cheap nodes for control dominated applications like temperature, pressure, area and health monitoring to more powerful and sophisticated nodes used for audio and video surveillance. Implementing a low power hardware/software platform for computationally intensive applications such...
Cooperative Network Coding is a novel technology that synergistically integrates Network Coding with cluster-based Cooperative Communications to produce enhanced network reliability and security features, while improving the throughput. In this paper, we consider the effect of the connectivity on the performance of wireless sensor networks using Cooperative Network Coding, and we present scenarios...
Ad hoc networks are threatened by a wide variety of accidental and malicious faults. This fact limits the practical exploitation of ad hoc networks. In consequence, apart from enforcing the dependability and security aspects of these networks, the provision of approaches to evaluate their behaviour in the presence of faults and attacks is of paramount importance. Accordingly, analysing and determining...
Sensor network is one of the authoritative leading technology of current century. Security is the main concern for everything whether it is for wired based networks or wireless based networks. So far, many of the researches have thought to physically implement the sensor nodes and sensor networks for secure communications but they did not think over it for security perspective. Sensor network works...
Wireless sensor networks can provide low cost solution to variety of real-world problems. As sensors have limited power, any security mechanism for the sensor network must be energy efficient. In this work we propose an energy efficient secure routing for wireless sensor networks based on dynamic key cryptography. We propose a Weight Based AODV protocol for the routing process in which the weight...
Key management is an important area of research in Wireless Sensor Networks (WSN), because resource constraints make security protocols difficult to be implemented. Key predistribution, which involves preloading keys in sensor nodes, has been considered as the best solution when sensor nodes are battery powered and have to work unattended. We propose a deterministic key predistribution scheme in WSN,...
Due to limitations of power, computation capability and storage resources, wireless sensor networks are vulnerable to many attacks. The paper proposed a novel routing protocol algorithm for Wireless sensor network. The proposed routing protocol algorithm can adopt suitable routing technology for the nodes according to distance of nodes to the base station, density of nodes distribution and residual...
Many sensor network protocols utilize the existence of disjoint paths (e.g., perfectly secure message transmission or multi-path key establishment), but do not address how a node actually determines these paths in the presence of an adversary. In this paper we investigate what assumptions are necessary to gather information about the local network topology when adversarial nodes are present and capable...
Nerve Net is a concept of regional wireless access platform where multiple service providers can provide their own services with the shared use of the network and sensors, making various context-aware services practical. It works as the nervous system of the human beings. Densely located, interconnected access points with database and data processing unit will provide mobility to terminals without...
Security is of critical importance for many potential applications of wireless sensor networks. Broadcasting from base station to nodes is very important in the cases such as distributing secure keys in the network or delivering control commands to nodes. However, the sparse distribution and limited resource of nodes bring difficulties to the efficient and reliable broadcast in wireless sensor networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.