The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Key management is considered as the fundamental part of any secure communication. In previous work, we propose RKPH scheme that was improved based on connectivity and resiliency compared to some other schemes. In this paper, we propose ARKPH, a modified scheme of RKPH that decrease impact of node compromise on sensor network security. In this scheme that we name it as alternative shared key replacement,...
A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wireless devices are often not protected by tamper-resistant hardware due to small form factors and low cost, and can be easily stolen/lost or temporarily controlled by unauthorized entities due to their harsh working environments...
Data aggregation is an efficient technique for reducing communication cost in wireless sensor networks. However it is vulnerable to false data injection attacks where the adversary node sends false data to the aggregation node and thus, stops the base station to acquire correct data. This paper proposes a secured data aggregation protocol which detects the false data injection during the data aggregation...
Key management is considered as the fundamental part of any secure communication. A secure wireless sensor network communication protocol relies on an efficient key management system. In sensor networks some random pre-distribution schemes are proposed for key management protocols. Connectivity and resiliency are two important criteria in key management. There is a trade-off between connectivity and...
Current routing protocols in WSNs or even in wireless Ad hoc networks are very susceptible to many attack i.e. stealthy attack. The most simple among those is where the adversary injects malicious routing information into the network. This results in routing inconsistencies leading to high increase in end-to-end delays or even packet losses in the network. In our paper, first, we abstract two fundamental...
Body area network (BAN) is an emerging technology which receives significant interest recent years. Typical BAN applications include healthcare, military, sports and first-responder. There is a great need to make BAN data transmission secure, accurate and protected. This paper presents a two-tier secure group communication framework (SG-BAN) for BAN data exchange, file sharing and remote display....
Secure group communication is one of the most significant requirements for different applications of a sensor network which employs a group rekeying mechanism for the secure and efficient delivery of its group data. We present a group rekeying scheme for broadcast security of a location aware wireless sensor network exploiting the polynomial share based peer to peer key establishment [3, 4, 5] technique...
This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature induced by the radio communications of a node on its neighboring nodes. We design a primitive that robustly and efficiently realizes this concept, even at the level of individual packets and when the network is relatively sparse. Using...
A scheme that exploits the broadcast nature of the wireless communication in order to achieve multicast content delivery is presented in this paper. As opposed to broadcasting, this method enables the clients to determine on-line the delivered content, and thus preserves the advantages of an individual service. On the other hand, a multicast content delivery is much more efficient than a unicast content...
Traffic congestion on major roadways costs our nation billions of dollars in lost earnings, wasted fuel consumption, injury and loss of human life. Providing motorists with real time roadway conditions is essential to mitigating traffic congestion. We propose a novel real-time messaging system that can be used to communicate imminent traffic conditions to motorists. Having such information can allow...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.