The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a Wireless Sensor Network (WSN), there are a large number of nodes whose power supply and computational capability are limited. The nodes in a wireless sensor network can be fixed or move randomly. Thus in these networks, to forward a data packet from one node to another needs to use specific strategies with very different characteristics. Accordingly the data forwarding strategy among nodes plays...
Wireless Sensor Network (WSN) are spread everywhere throughout the world and are ordinarily used to gather physical data from the encompassing scene. WSN play a focal part in the Internet of Things (IoT) vision. WSN is rising as a noticeable component in the middleware connecting together the Internet of Things (IoT) and the Web of Things (WoT). But the integration of WSN to WoT brings new challenges...
In past years, mobile ad hoc networks (MANETs) widespread use in many applications, including for some mission-critical applications, and has become one of the major concerns such as security MANETs. MANETs due to some unique characteristics, prevention methods are not alone enough to protect them need, Therefore, the detection is possible for an attacker to breach system security, such as the need...
With the advancement of mobile devices, a new paradigm called opportunistic sensor networks emerges which has a lot of applications, such as Military surveillance, disaster relief, search and rescue, vehicle tracking and much more. Opportunistic Sensor Network (OSN) has become one of the actively researched areas motivating researchers to come up with routing strategies and securing the routing with...
As sensor nodes in a wireless network are tiny, very small, low-cost and deployed in an unattended environment, they are easily prone to many kinds of serious attacks. One such attack is Node Replication attack, where the attacker creates multiple clones /replicas of the legitimate node and deploys them at various paths in the network. As these replicas behave exactly like legitimate node, it is very...
Wireless Sensor Network (WSN) is an energy consumed network. Since most of the energy is consumed for transmitting and receiving data, the energy saving mechanisms plays a vital role in WSNs. One important mechanism to reduce energy consumption in the network is data aggregation. In-network data aggregation removes redundancy as well as unnecessary data forwarding, and hence cuts on the energy used...
Wireless sensor networks (WSNs) is becoming very popular because of its use in different areas like data gathering, surveillance, monitoring and controls etc. WSN consist of large number of sensing devices. In the sensor network hundreds/thousands sensor nodes are available. The sensor nodes in WSN are normally consist with limited power supply. In wireless sensor network for increasing lifetime of...
Wireless Sensor Network is one of the most advanced and emerging technologies of the upcoming world and is being used in GPS Tracking, medical fields, Defence Departments, homeland security etc. The topology of WSN works in a triangular pattern. The sensor nodes collects the information from the environment, and sends it to the sink node, the sink node further transfer the information to base station...
Identity based infrastructure allows the public key of a user to be derived easily from a predefined aspect of their known identity such as a phone number, passport number or other universally unique identifier. Recently, Hölbl and Welzer have proposed an identity-based key establishment protocol. However, this protocol is found to be vulnerable to man-in-the-middle attacks and impersonation attacks...
For the problems of energy constrained and the channel insecurity in group communication of WSN, we propose a self-healing group key management protocol based on polynomial and some algorithm. This protocol can recover the lost group key without transmitting message once more. The method can improve the security of the channel, while consuming less energy. The performance analysis of this protocol...
Social Networking Sites (SNS) require a centralized system accessible via Internet. SNS' owners are in control of user's data; this often leads to data theft, piracy and privacy issues. This paper proposes a way of socializing with people in surrounding places by using a ubiquitous social sensor network system (USSNS) where Wireless Sensor Node interact in a peer-to-peer mode without the need of Internet...
Data aggregation is a widely used technique in wireless sensor networks to reduce the power consumed in WSN. In a bid to reduce the power consumption during data gathering, cluster heads are elected to gather data from every node in the WSN. There are various challenges that are involved in the process of data aggregation like checking of duplication of data after encryption, overhead due to encryption...
Wireless sensor network is an emerging technology due to its wide range of application. This scheme proposes a new secure protocol with better security and Even-driven cluster formation brings energy efficiency by avoiding the unnecessary formation of clusters, when no event is there in the network The proposed scheme adopts a level based secure hierarchical approach to maintain the energy efficiency...
Ubiquitous Computing is a new Internet revolution that will allow, among other uninterrupted access to the network actors machines and some mobile devices. In this paper, the example of mobile laboratory is composed a Wireless Sensor Network (WSN) whose the data collection is done through a special node called master. HIP (Host Identity Protocol) is used as communication protocol. The HIP architecture...
Security of deployed wireless sensor networks (WSNs) has become a crucial task as the deployment of WSN'S grows. This paper proposes a novel way and develops a mechanism to prevent wormhole attacks by an algorithm to manage a large number of nodes using node ID. Also, the proposal creates a load balancing feature for monitoring a hierarchical system for nodes and extra packet header on each node to...
As sensor nodes are deployed in hostile or remote environment and unattended by human, they are prone to different kind of attacks. So adaptation of dynamic key is very important for secure key management, for encrypting messages for communication.
In this paper we present a distributed self organizing trust based clustering framework for securing ad hoc networks. The mobile nodes are vulnerable to security attacks, so ensuring the security of the network is essential. To enhance security, it is important to evaluate the trustworthiness of nodes without depending on central authorities. In our proposal the evidence of trustworthiness is captured...
Vertical approach still largely dominates smart devices systems. Even in IoT, proprietary protocols and backend systems are still common. The presented solution aims at harmonizing different standards and architectures, improving sustainability and security. It also allows to use a IaaS approach to further enhance the sensor networks business model.
Wireless Sensor Networks (WSNs) are used in many applications in military, environmental, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory,...
This paper provides on introduction on key strategy for wireless sensor network. Many key Strategy are focus on proposed pair wise based on key strategy technique. Key management Mechanism Provide a security over a Wireless sensor network. Many Scheme are focus on proposing new pair wise based key management strategy. The key management mechanism combines trusted-server and key pre-distribution scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.