The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Key establishment in wireless sensor networks is a challenging problem for the constrained energy, memory, and computational capabilities of the sensor nodes. Most existing key management schemes try to establish pairwise keys for each pair of neighbor sensors, whether these nodes communicate with each other or not, and this causes large overhead. In this paper, focusing on the management of encryption...
People in rural areas are less likely to obtain broadband Internet access due to a combination of economic disadvantage, technical difficulties, and lack of service providers. There is a great need to develop robust, low-cost and easy-to-maintain network management platform for Wireless Internet Service Providers (WISP) in rural areas. The goal of this project is to partner with a small local start-up...
Wireless mesh network is a new type of network paradigm in which each node communicates to others to enhance network reliability and performance. Routing in wireless mesh network is a challenging task. Despite from the traditional routing, field based routing uses a little information to route the packets. Due to this characteristic, field based routing algorithms are inexpensive and robust, but such...
We investigate the risk associated with multihop wireless communications due to eavesdropping. When the same message traverses cross a multihop wireless network, potential security leaks may occur because of intelligent and collaborative eavesdroppers even if all individual links from source to destination have signal leakage below a security threshold. We termed this phenomenon ??cumulative security...
In view of the existing situation that patients' physiological information is not timely and securely acquired and medical workers is easy infected in some particular large scale medical assistance application, a feasible solution based on wireless sensor networks is proposed. In the solution, a secure network topology based on hexagonal mesh is constructed according to node locations for acquiring...
Considerable advancements in the technology of wireless sensor networks (WSNs) are taking place due to smaller, and more efficient electronic devices which are capable of increased processing power, and communication capabilities. In addition, the cost of such devices is constantly decreasing, which makes it possible to employ large quantities of networked sensors in numerous commercial, environmental,...
Re-authentication delay is a major concern of fast handoff in wireless mesh networks. Most recent efforts focus on proactive approaches by transferring security context to potential target mesh routers before handoff occurs. However, the efficiency and effectiveness of such approaches are significantly affected by the density of potential targets and the accuracy of handoff prediction which is in...
LR-WPANs mainly target low data rate and short range applications. Packet delivery in such networks is achieved through routing and packet forwarding. So we should provide security for both operations. In this paper, these two types of threats within the current LR-WPAN security architecture are identified and an efficient security framework (ESF) is presented. It protects both routing and data forwarding...
Wireless reconfigurable networks are prone to several security attacks such as selective forwarding, black holes, and wormholes. In this paper, we introduce a network coding method that detects security attacks related to routing. The proposed method works on a distributed fashion performing random network coding over nodes composing a given route, not only to distribute content, but also to provide...
Wireless mesh network (WMN) is one of emerging technology of the next generation networks, and it is going to address the internet provision to users at low cost anytime from anywhere. Being a broadband wireless network of the future, still it is facing a lot of technical and critical issues which are prohibiting it from the world wide deployment and acceptance. The multi-hop nature and the ad hoc...
Wireless ad hoc networks (WANETs) offer communications over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in self-organized WANETs is more challenging than in conventional networks due to the lack of central authorities. In this paper, we propose a generic model to evaluate the relationship of connectivity, memory size, communication...
This paper will focus on developing fundamentally new methods to design the next generation of wireless networks. The proposed top-down cross-layer approach will address spectrum sharing, medium access, cooperative and adaptive link management, and opportunistic access and information routing. The proposed techniques will enable vast new application areas beyond traditional communications including...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.