The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IEEE 802.16m, aiming at providing secure communication pathways between the base station (BS) and the mobile station (MS), is a broadband wireless MAN (Metropolitan Area Network) standard. Its security sublayer contains a Privacy Key Management (PKM) protocol, which achieves authentication and key management in the communication process. In this paper, we apply Communicating Sequential Processes (CSP)...
Wireless Sensor Networks have been known and used for a long time, but as time passed they started to improve and generate more interest from end users. As the attention increased, so did the attacks on these, due to their limited capacities and methods to employ an efficient protection. The key interest for current research teams is to develop methods to protect data without impacting the communication...
As sensor nodes in a wireless network are tiny, very small, low-cost and deployed in an unattended environment, they are easily prone to many kinds of serious attacks. One such attack is Node Replication attack, where the attacker creates multiple clones /replicas of the legitimate node and deploys them at various paths in the network. As these replicas behave exactly like legitimate node, it is very...
The future healthcare systems' growth and development have greater dependence on Wireless Body Area Network (WBAN). Notwithstanding, the utilization of untrustworthy methods has made it defenseless against various attacks. These attacks can be kept under check by utilizing different security procedures. For this reason a security protocol named Se-Small is utilized. The procedure includes signing...
Wireless Sensor Network (WSN) is an energy consumed network. Since most of the energy is consumed for transmitting and receiving data, the energy saving mechanisms plays a vital role in WSNs. One important mechanism to reduce energy consumption in the network is data aggregation. In-network data aggregation removes redundancy as well as unnecessary data forwarding, and hence cuts on the energy used...
The security of operations within a wireless sensor network requires the protection of messages exchanged between the sensor nodes. To achieve the security aims and prevent a WSN from being compromised by an adversary. Key management is a security technical in wireless sensor networks (WSN). In the remainder of this paper, we propose a new key pre-distribution scheme that was based on the modification...
Wireless Sensor Networks (WSNs) is collection of large number of sensor nodes which are of limited capabilities, to collect sensitive information. With the advancement of this technology, one of the major concerns these days is of security. There are so many attacks possible on WSN, in Distributed-Denial of Service (DDOS) attacks, malicious nodes adapts many attacks such as flooding attack, black...
Wireless Sensor Network (WSN) has witnessed tremendous progress in the domain of processing power enhancement and improvement in sensing capabilities and wireless communications. With more critically important applications being designed for the WSN, security becomes a matter of prime importance. Though a lot of work has been carried out in the field of security for WSN, yet providing a robust security...
A RFID indoor personnel location tracking system is proposed to manage the foreign visitors, for the safety issue of critical assets in confidential areas. The design of the low power wearable RFID location tag with identity binding function based on heart rate detection, and extreme low power method based on human posture are described in detail. The portable RFID location base stations and the communication...
Wireless sensor networks (WSNs) is becoming very popular because of its use in different areas like data gathering, surveillance, monitoring and controls etc. WSN consist of large number of sensing devices. In the sensor network hundreds/thousands sensor nodes are available. The sensor nodes in WSN are normally consist with limited power supply. In wireless sensor network for increasing lifetime of...
Wireless Sensor Network is one of the most advanced and emerging technologies of the upcoming world and is being used in GPS Tracking, medical fields, Defence Departments, homeland security etc. The topology of WSN works in a triangular pattern. The sensor nodes collects the information from the environment, and sends it to the sink node, the sink node further transfer the information to base station...
Security is a very important requirement in networks and wireless sensor network are no exception to this. During security attack, an attacker can inject an intruder node in the network which can alter the data being disseminated or modify the data item too. So towards overcoming this issue, security protocol called Didrip was developed for flat based network which allows for distributed data discovery...
Wireless Sensor Network (WSNs) are commonly deployed in hostile (unattended) and open environments, where it is easy for an attacker to physically capture some of the legitimate nodes, copy credentials, reprogram them and re-deploy them in the WSN. Such type of attack is called Node Replication or Clone Node Attack. With this attack an attacker can easily gain significant control over the WSN. In...
The traffic characteristics of Internet of Things and machine type devices differ significantly from that of smart phone applications. The connection oriented approach in Long Term Evolution (LTE) that involves establishing a bearer prior to data transmission is inefficient for small burst traffic because of the signaling involved. We propose a connectionless access method for efficient small burst...
Data aggregation is a widely used technique in wireless sensor networks to reduce the power consumed in WSN. In a bid to reduce the power consumption during data gathering, cluster heads are elected to gather data from every node in the WSN. There are various challenges that are involved in the process of data aggregation like checking of duplication of data after encryption, overhead due to encryption...
Wireless sensor network is an emerging technology due to its wide range of application. This scheme proposes a new secure protocol with better security and Even-driven cluster formation brings energy efficiency by avoiding the unnecessary formation of clusters, when no event is there in the network The proposed scheme adopts a level based secure hierarchical approach to maintain the energy efficiency...
In wireless sensor networks it is becoming more and more important for sensor nodes to maintain anonymity while communicating data because of security reasons. Anonymous communication among sensor nodes is important, because sensor nodes want to conceal their identities either being a base station or being a source node. Anonymous communication in wireless sensor networks includes numerous important...
With the related applications of wireless sensor networks getting into our lives quickly, the research of WSN is growing more and more necessary. The most significant problem which threatens the successful deployment of sensor systems is privacy, there are many protocols providing the security of news content for the WSNs. However, due to the open feature of sensor networks, context information is...
Most of the sensor nodes are battery powered and energy utilization is one of the important criteria. At the same time Securing code update is very much essential for military, health care and environmental applications. But to send the code updates in a distributed, multihop sensor networks, most of the energy will be consumed in forwarding the packets to next hop sensor nodes. In order to avoid...
Designing an energy efficient key management scheme to secure Wireless Sensor Networks is a challenging task because sensor nodes in the network are resource constrained. If an initial key is used in the network lifetime, a key stolen by an unauthorized node will results in data compromised that is generated in the network. So a re-keying is necessary after a specified number of rounds to avoid the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.