The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSNs), deployed in distributed Internet of Things (IoT) applications, measure data, process, exchange information, and function collaboratively with other sensor nodes and end-users, which can be internal or external to the network. To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication...
Railways constitute a main means of mass transportation, used by public, private, and military entities to traverse long distances every day. Railway control software must collect spatial information and effectively manage these systems. Wireless sensor networks (WSNs) are an attractive solution to cover the area along-side the railway routes. In-carriage WSNs are also studied in cases of dangerous...
The security of operations within a wireless sensor network requires the protection of messages exchanged between the sensor nodes. To achieve the security aims and prevent a WSN from being compromised by an adversary. Key management is a security technical in wireless sensor networks (WSN). In the remainder of this paper, we propose a new key pre-distribution scheme that was based on the modification...
We formalize in this work a model for node capture attack in a secure wireless sensor networks (WSNs). The adversary starts by overhearing exchanged messages to learn about the network because of all data transmissions nature (all in the air). Then, it has the physical access to the node, and with appropriate tools, it can read the secret information (like keys, programs, etc.) stored in the victim...
As the devices in Wireless Sensor Networks (WSNs) are small in size, and have resource constraints such as memory utilization, power consumption, and processing speed that needs to be taken in consideration. The security and life span of sensor nodes is compromised with these restraints. The purpose of this paper is to assess the performance of the Secure Force algorithm on an 8-bit microcontroller...
Security in wireless sensor networks is critical due to its way of open communication. In this paper we have provided a solution to detect malicious nodes which perform radio transmission power control attack and sinkhole attack in wireless sensor networks. In the proposed approach, data transmission is divided into multiple rounds of equal time duration. Each node chooses the parent node in the beginning...
In today's digitized era almost all data is transferred digitally which is very easy and advantageous but it also has some shortcomings i.e. the security of this data is very important. With the advent of wireless sensor networks in military regions, security of this secret data is very crucial. So Security technique such as steganography can provide the need to be a lightweight and energy efficient...
Within wireless networks, an unauthorized or malicious wireless device can receive broadcasted messages or broadcast its own messages at any time provided it is within signal range of other wireless network nodes. Wireless networks have a higher rate of bit errors (BER) when compared to wired networks. The frequency of attacks on networks has grown in parallel with development of wireless networking...
Encryption has become a critical need for almost every data communication systems. A huge value of sensitive data is transferred daily via different computer networks such as electronic banking, email applications and file exchange. Advanced Encryption Standard (AES) algorithm has become the optimum choice for various security services in numerous applications like Ad hoc networks and wireless sensor...
Optimization Wireless Sensor Network (WSN) is necessary to reduce redundancy and energy consumption. To optimizing wireless sensor networks for secured data transmission both at cluster head and base station data aggregation is needed. Data aggregation is performed in every router while forwarding data. The life time of sensor network reduces because of employing energy inefficient nodes for data...
Security in wireless sensor networks is critical due to its way of open communication. Packet modification is a common attack in wireless sensor networks. In literature, many schemes have been proposed to mitigate such an attack but very few detect the malicious nodes effectively. In the proposed approach, each node chooses the parent node for forwarding the packet towards sink. Each node adds its...
In wireless sensor networks, the clustering routing protocol is commonly used for energy efficiency. However, routing protocols without proper security suffer from many security vulnerabilities. Hence, a key renewal scheme based on the clustering routing protocol is proposed. To apply the key renewal scheme with sensor authentication, sensor nodes are first authenticated during the key establishment...
Due to the diversification in application and very challenging characteristics the Wireless Sensor Networks (WSN) considered to be an important and fast growing technology in the field and hence it gains attention from the researchers. While focusing on the advancement in the development of technology, the energy efficiency and effective computation methods plays a crucial role in determining the...
Wireless Sensor Networks (WSNs) consist of a collection of cheap, easy to deploy Sensor nodes arranged together to fulfill a specific purpose (monitoring, tracking …etc.). A WSN network is composed of a Base Station (BS) and collection of sensors. There are a lot of approaches for the network construction. Amongst them is the hierarchical structure, where the network is divided into clusters and the...
Wireless Sensor Networks are present in a wide range of environments. The possibility of secure interaction with other networks is a current challenge. It will be necessary that the components of the network can adapt its algorithms (authentication, cryptography) to the requirements of the application in real time. This paper presents a flexible hardware-based approach using partial reconfiguration...
To lead to the Smart Cities, we should have the possibility of obtaining information from different places and objects anytime and anywhere, in order to collect sufficient data to anticipate problems and take a good decisions. This will promote to an effective and autonomous organization by creating interacted and communicated objects around the city. So, we need to install various and specific IP-based...
Sensor-cloud is a relatively new interdisciplinary domain that combines the fields of Wireless Sensor Networks (WSN) and Cloud Computing. The major issue needs to be addressed in Sensor-Cloud is storage and retrieval of data. Data security is preserved by encrypting the sensor data before storing it into the cloud. On analysis of existing methods, there are two different issues, First issue; Encrypted...
In Wireless sensor networks (WSNs), many tiny sensor nodes communicate using wireless links and collaborate with each other. The data collected by each of the nodes is communicated towards the gateway node after carrying out aggregation of the data by different nodes. It is necessary to secure the data collected by the WSN nodes while they communicate among themselves using multi hop wireless links...
Due to their limited software and hardware capabilities, wireless sensor nodes are vulnerable against radio jamming. This becomes even worse if energy-efficient jamming is achieved by exploiting knowledge of the data link layer. Encrypting the packets may help to prevent or restrict the jamming. However, due to the nature of the MAC (Media Access Control) protocols, the jammer may take advantage and...
A group of sensor nodes deployed in particular environment constitutes a wireless sensor network (WSN). At times the WSN can be even deployed in a very sensitive area where the security becomes a great problem. The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.