The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Network (WSN) is an energy consumed network. Since most of the energy is consumed for transmitting and receiving data, the energy saving mechanisms plays a vital role in WSNs. One important mechanism to reduce energy consumption in the network is data aggregation. In-network data aggregation removes redundancy as well as unnecessary data forwarding, and hence cuts on the energy used...
The security of operations within a wireless sensor network requires the protection of messages exchanged between the sensor nodes. To achieve the security aims and prevent a WSN from being compromised by an adversary. Key management is a security technical in wireless sensor networks (WSN). In the remainder of this paper, we propose a new key pre-distribution scheme that was based on the modification...
In wireless sensor networks, secure MAX/MIN query processing is a challenging issue, and it is useful in fields, where security is necessary. In this paper, we propose a secure MAX/MIN query processing method in two-tiered wireless sensor networks. To the best of our knowledge, it is the first work that can achieve data privacy protection and query result integrity verification simultaneously. Three...
Recent years have shown a huge growth in technology, which led to an explosive growth in the volume of data which is referred to as “Big Data”. Wireless sensors are considered one of the highly anticipated contributor to big data nowadays, therefore, avoiding misleading or forged data gathering in case of sensitive and critical data through secure communication is vital. This can be achieved though...
Wireless sensor network (WSN) comprises of several nodes usually called motes or sensors. These motes gathered together and collect data by observing the surroundings and reported the information to one or more reliable links. This valuable data only be accessible between two communicating parties. To secure the data that delivers between the two parties, we require a secure node authentication scheme...
Wireless Sensor Network (WSN) consisting of a large number of tiny sensor nodes deployed in unattended hostile environment is vulnerable to various attacks including node capture. An attacker may physically capture, reprogram and redeploy a node in the network. A node, that is victim of capture attack, must be revoked from the network to avoid further insider attacks. In this paper, we present a node...
Wireless Sensor Network (WSN) contains a lot of sensors called nodes or motes. These sensors sense the environmental data, according to the application, and then communicate with each other, and finally send these data or readings back to the base station. WSN security is an important issue, since motes are usually left to operate unattended in the environment where they were deployed. Intruder may...
Wireless sensor networks (WSNs) is becoming very popular because of its use in different areas like data gathering, surveillance, monitoring and controls etc. WSN consist of large number of sensing devices. In the sensor network hundreds/thousands sensor nodes are available. The sensor nodes in WSN are normally consist with limited power supply. In wireless sensor network for increasing lifetime of...
Generally in practice there are Optical Fiber, Waveguides, Satellite Communication, Coaxial Cable and copper Wire which are utilized by the heterogeneous and homogeneous networks to offer wider range of data and voice communication to the end users. In future as the demands for bandwidth increases for the purpose of communication, this results into imbalance of the traffic load. To provide addition...
Security in Wireless Sensor Network (WSN) has become a key issue due to demanding areas in which WSNs are being applied. With scarce resources in sensor nodes seasoned techniques like Diffie-Hellman, RSA and elliptic curve cryptography (ECC) cannot be used because they have resource demanding computations. Key pre-distribution has proved to be the most feasible amongst key management schemes in WSNs...
“Wireless Sensor Networks (WSNs) are currently using in various application areas like as military, health care, ecological, medical, process management, environmental, industrial, agriculture etc. In this article we discussed about the security issues in WSNs. First of all we constraints on the obstacles in WSNs, requirement for security and different attacks at various levels with their solutions...
Primarily deployed for monitoring environmental parameters, WSN are now finding increased use in commercial, domestic, military and health applications. There deployment in hostile terrains and for mission critical applications touching human lives call for addressing their security issue. Especially under IoT and smart city projects like Padova Smart City project, the range of applications envisioned...
Optimization Wireless Sensor Network (WSN) is necessary to reduce redundancy and energy consumption. To optimizing wireless sensor networks for secured data transmission both at cluster head and base station data aggregation is needed. Data aggregation is performed in every router while forwarding data. The life time of sensor network reduces because of employing energy inefficient nodes for data...
Wireless sensor networks (WSNs) are omnipresent in a multitude of applications. One of the important common requirements of these applications is the data security. Indeed, the exchanged data in WSNs are often considered as a preferred target, which can be a subject of several threats, such as eavesdropping, replay, falsification, alteration, etc. Another important common requirement of WSNs applications...
Wireless sensor networks are susceptible to clone attack due to open deployment of sensor nodes in hostile environment and lack of physical shielding. Node clone is an attempt where an adversary physically compromises a node, extract all the credentials such as keys, identity and stored codes, make hardware replicas with the captured information and introduce them at specified positions in the network...
In a node replication attack, an adversary creates replicas of captured sensor nodes in an attempt to control information that is reaching the base station or, more generally, compromise the functionality of the network. In this work, we develop fully distributed and completely decentralized schemes to detect and evict multiple imposters in mobile wireless sensor networks (MWSNs). The proposed schemes...
Securing code update is essential for military and health care applications. The functionalists of the sensor nodes in military and health monitoring region depend on their environmental conditions. The sensor nodes will be divided into different multi cast groups based on their location. For each multi cast group a different code update will be sent. We have developed a scheme for secure code update...
Secure communication inWireless Sensor Networks (WSNs) requires the verification of the identities of network nodes. This is to prevent a malicious intruder from injecting false data into the network. We propose an entity authentication protocol for WSNs, and show how its execution can be integrated as part of routing protocols. The integration between routing and authentication leads to two benefits...
In wireless sensor networks securing code update is essential for many crucial military applications. The nodes deployed in border areas in the military region called the border sensor nodes are the more sensitive nodes. The border sensor nodes need to do some special tasks compared to other intermediate sensor nodes. So the code update to be sent to the border nodes will be different from the other...
Wireless sensor networks are often placed in an open environment and are susceptible to various attacks. Traditional cryptography methods are not effectual in WSNs. Trust management has been proved to be an effective measure to enhance security as well as to handle threats for WSNs. In this paper, TBE-LEACH, an improvement in LEACH protocol has been proposed by introducing trust to provide secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.