The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks are responsible for sensing, gathering and processing the information of the objects in the network coverage area. Basic data fusion technology generally does not provide data privacy protection mechanism, and the privacy protection mechanism in health care, military reconnaissance, smart home and other areas of the application is usually indispensable. In this paper, we consider...
As sensor nodes in a wireless network are tiny, very small, low-cost and deployed in an unattended environment, they are easily prone to many kinds of serious attacks. One such attack is Node Replication attack, where the attacker creates multiple clones /replicas of the legitimate node and deploys them at various paths in the network. As these replicas behave exactly like legitimate node, it is very...
This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is...
Critical Infrastructure Security had always been an issue. With the technological advancements, there has been a continuous inflow of novel methods for critical infrastructure security. In this paper, design, implementation, and field tests of a novel critical infrastructure security system based on wireless sensor networks is presented.
The goal of this paper is to construct an adaptive scheme that uses combinatorial keying for heterogeneous mobile wireless sensor nodes (ACKS-HWSN). Most of the previous work in security of WSN deals with homogeneous sensor nodes (SNs). In homogeneous WSNs, all sensors have similar resources (such as memory capacity, and battery life). Many techniques designed for these networks suffer from communication...
Wireless sensor network has emergence in various fields, so security is very important issue for sensor networks. Security comes from attacks. Due to the wireless and distributed nature anyone can connect with the network. Among all possible attacks, wormholes are very hard to detect because they can cause damage to the network without knowing the protocols used in the network. It is a powerful attack...
Wireless Sensor and Actuator Networks (WSANs) are highly heterogeneous regarding hardware, software, and application requirements. Developing WSAN applications is a hard task, as it requires domain and network knowledge and there is a lack of methodologies, architectures, and patterns to help software developers with such task. Moreover, non-functional requirements play an essential role to ensure...
The evolution of digital communication era includes both devices and applications running on different platforms. Specifics applications are needed for a safeguard communication ensuring protection and trust services to the users. This paper presents an authentication and session-key establishment protocol that enabling mutual authentication procedure between involved entities in the WSNs. This scheme...
In wireless sensor networks it is becoming more and more important for sensor nodes to maintain anonymity while communicating data because of security reasons. Anonymous communication among sensor nodes is important, because sensor nodes want to conceal their identities either being a base station or being a source node. Anonymous communication in wireless sensor networks includes numerous important...
Cognitive Radio (CR) is an efficient means to improve the under employment of scarce spectrum resource [1]. The proposed A-BPRS (Altruistic Bit Perk Running Scheme) controller, which in turn detects and terminates the presence of Malicious users and it let the white space to be filled by the neighboring reconfigurable secondary users, thereby maximizing the throughput and minimizing the under employment...
How to accurately and rapidly detect traffic attack is an important security problem in wireless sensor networks. An energy-saving ARMA-based traffic attack detection protocol is proposed in this paper. The detection protocol uses linear prediction to establish easy ARMA(2,1) model for sensor nodes. In the detection protocol, different nodes play different roles, and use different monitor schemes...
Secure data transmission is a critical issue for Clustering (WSNs). Clustering is one of the techniques used to manage data exchange amongst interacting nodes. Each group of nodes has one or more elected Cluster head(s), where all Cluster heads are interconnected for forming a communication backbone to transmit data. Moreover, Cluster heads should be capable of sustaining communication with limited...
In this paper we present a distributed self organizing trust based clustering framework for securing ad hoc networks. The mobile nodes are vulnerable to security attacks, so ensuring the security of the network is essential. To enhance security, it is important to evaluate the trustworthiness of nodes without depending on central authorities. In our proposal the evidence of trustworthiness is captured...
A data discovery and dissemination protocol for wireless sensor networks (WSNs) is answerable for updating configuration parameters of, and distributing management instructions to, the sensor nodes. All existing data discovery and dissemination protocols undergo from two drawbacks. First, they are based on the centralized approach; only the base station can distribute data item. Such an approach is...
Wireless sensor network (WSN) is made up two or more interconnected sensor nodes wirelessly. These nodes may be deployed either in open or closed environment. As these nodes communicates wirelessly and deployed in open environment there are always threat of security of nodes as well as data communicated. In order to making secure communication over WSN there should be some security mechanism. In this...
Mobile agent technology offers a number of advantages to resource constrained Wireless Sensor Networks (WSNs) by facilitating parallelism, code and data dissemination, localization, and distributed security services. As part of the second line of defense for WSNs, anomaly detection schemes are also benefiting from mobile agent technology. The formal verification can be used to validate the correctness...
Passive attacks have caused a great threat to Wireless Sensor Networks (WSN), therefore the research of communication nodes and the stealthiness of communication relationship is crucial. Due to the problem of node hidden mechanism, a secure anonymous routing named Node-Uncorrelated Pseudonym Pairwise Mechanism (NUCPP) is proposed in this paper. Instead of using the traditional pseudonym node correlation...
Heterogeneous Sensor Networks are more powerful and efficient than homogeneous sensor networks. It has been shown that homogeneous sensor networks perform poorly because of routine limits and scalability. In our research, we consider to use heterogeneous topology to securely route data in a wireless sensor network. The given area of interest is initially partitioned into Voronoi clusters, where low-end...
Heterogeneous Sensor Networks are more powerful and efficient than homogeneous sensor networks. It has been shown that homogeneous sensor networks perform poorly because of routine limits and scalability. In our research, we consider to use heterogeneous topology to securely route data in a wireless sensor network. The given area of interest is initially partitioned into Voronoi clusters, where low-end...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.