The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Given that transmission cost is significant in a Wireless Sensor Network (WSN), sending explicit keying control messages significantly increases the amount of energy consumed by each sensing device. Thus, in this paper, we address the issue of security for WSNs from a completely novel perspective. We present a technique to secure the network, without the transmission of explicit keying messages needed...
Sensor networks have been proposed for military and scientific applications such as border security and environment monitoring. They are usually deployed in unattended and hostile environments, so security is a major concern. A fundamental requirement in wireless network security is the ability to establish keys between pairs of sensors. In this paper, we propose a new location-based key management...
Wireless sensor networks (WSNs) have the potential to be widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized interception and detection. Privacy is becoming one of the major issues that jeopardize the successful deployment of wireless sensor networks. While confidentiality of the message...
Many emerging network applications are based upon a group communication model. In a peer-to-peer or ad-hoc network which do not have a previously agreed upon common secret key, communication is susceptible to eavesdropping, Hence a secure distributed group key agreement is required to establish and authenticate a common group key for secure and private communication. This paper presents an authenticated...
Despite extensive research on flat ad hoc networks, meeting satisfactory security levels in sensor networks presents many problems. The main reason is that these networks are typically designed based on hierarchal structures. In this paper, we propose an efficient scheme for authentication and key management in hierarchical ad hoc sensor networks using symmetric polynomials. In the proposed method,...
Recently, System-on-Chip (SoC) technology has been adopted to design smaller, lower-power and cheaper tamper-resistant sensor nodes. In these nodes, we find that there exists a lifetime-secure memory fraction which stores the anterior part of the application executable binary code, namely "fingerprint". We propose a key management protocol based on this secure finger- print-FKM. In this...
In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control plane, a routing protocol, e.g., BGP, OSPF, exchanges routing state updates and enables routers to compute the best paths towards various destinations. During this phase, an attacker can modify or inject malicious control messages...
It cannot satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. But, most space mission cannot simultaneously carry on the security in the multiple layers, because of that is easy to have the repetition induction, and introduce shortage of security, and increase development and the operating cost. In this paper, we proposed the...
In this paper, we propose an anonymous protocol to secure nodes which have important roles in the network. We focus in the clustering approach to secure the mobile ad hoc networks (MANETs). In each cluster, a confident node is selected to ensure the certification authority (CA) roles; however, the cluster security depends in the security of the CA node. Therefore, we present an anonymous dynamic demilitarized...
The energy-constrained wireless sensor nodes require the designs of energy-efficient content authentication protocols. In this paper, we combine the approaches of cryptography and content analysis to propose a new light-weight content authentication framework Cobra. In Cobra, only a small fraction of transmitted packets are protected with signatures. The unprotected packets are authenticated using...
An effective group key agreement protocol is important for group-oriented applications. Some key tree approaches have been proposed by other researchers. The rekey cost of some of them scales with the logarithm of the group size for a join or leaving request, in which TGDH (tree based group Diffie-Hellman) is considered as one of the most effective and secure protocols. But the rekey cost is still...
We investigate the impact of node capture attacks on the confidentiality and integrity of network traffic. We map the compromise of network traffic to the flow of current through an electric circuit and propose a metric for quantifying the vulnerability of the traffic using the circuit mapping. We compute the vulnerability metric as a function of the routing and the cryptographic protocols used to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.