The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The goal of this paper is to construct an adaptive scheme that uses combinatorial keying for heterogeneous mobile wireless sensor nodes (ACKS-HWSN). Most of the previous work in security of WSN deals with homogeneous sensor nodes (SNs). In homogeneous WSNs, all sensors have similar resources (such as memory capacity, and battery life). Many techniques designed for these networks suffer from communication...
Summary form only given. Information Assurance (IA) grew out of the field of computer network security. However, IA is a much broader term than network security and relates to the managing of the risks associated with the use, processing, storage, and transmission of information. The most basic model of IA relies on three properties: confidentiality, integrity, and availability, thus it is often referred...
Security and trust are fundamental challenges when it comes to the deployment of large wireless sensor networks. In this paper, we propose a novel hierarchical trust management scheme that minimizes communication and storage overheads. Our scheme takes into account direct and indirect (group) trust in trust evaluation as well as the energy associated with sensor nodes in service selection. It also...
In wireless sensor networks, secure and efficient routing is very important. But its realization is difficult because of the limited resources of sensor nodes and the many routing factors. In order to realize secure routing, shorten the delay and prolong the life of the network simultaneously, we make two efforts in this paper. The first is building a trust model based on the ratio of packets delivery,...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
For application researches of the detection for the gas signal source, a method for orientation estimation of the gas signal source in the two-dimensional space and its algorithm are presented in the paper. In the method, a mode of dual-line gas sensor array is applied to sample the signals of the gas concentration in real time, and the time delay estimation, an approach of the signal processing,...
A principal factor in sensor network design is energy efficiency. In this work, we propose to extend the lifetime of sensor networks using appropriate choice of sensor node distribution. The key idea of our scheme is to deploy more nodes in areas of extensive energy usage. Using this scheme of sensor node distribution, we use probabilistic angular routing to route data packets from the sensor nodes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.