The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There are billions of Internet of things (IoT) devices connecting to the Internet and the number is increasing. As a still ongoing technology, IoT can be used in different fields, such as agriculture, healthcare, manufacturing, energy, retailing and logistics. IoT has been changing our world and the way we live and think. However, IoT has no uniform architecture and there are different kinds of attacks...
The increasing adoption of the Internet of Things introduces new threats that affect the privacy of users. Current privacy enhancing technologies are not sufficient to address all these new threats. This paper explains one of the most powerful protocols, namely DC-net. The DC-net protocol, while more than 30 years old, was never used in real-life due to its overhead and sensitivity with regards to...
For single-owner multi-user wireless sensor networks, there is the demand to implement the user privacy-preserving access control protocol in WSNs. Firstly, we propose a new access control protocol based on an efficient attribute-based signature. In the protocol, users need to pay for query, and the protocol achieves fine-grained access control and privacy protection. Then, the protocol is analyzed...
With the advancement of mobile devices, a new paradigm called opportunistic sensor networks emerges which has a lot of applications, such as Military surveillance, disaster relief, search and rescue, vehicle tracking and much more. Opportunistic Sensor Network (OSN) has become one of the actively researched areas motivating researchers to come up with routing strategies and securing the routing with...
In a WSN, sink-node gathers data from surrounding nodes and sends it to outside world via a gateway. Therefore, its location information is important to both attacker and network operator. The former can launch attacks on a sink-node to steal information or damage it, while the latter must hide its location to ensure data's safety, and physical protection. Providing sink-node location information...
WSN is mainly used at such a place, where the normal wired network configuration is not possible. So, the sensor nodes are deployed over such places to perform monitoring and tracking. Sensor nodes communicate in their transmission range only, so if the sink node is not present in their range, the message will be delivered in multi-hop fashion. There is a high chance that the communication over the...
A redundant fog loop-based scheme is proposed topreserve the source node-location privacy and achieve energyefficiency through two important mechanisms in wireless sensornetworks (WSNs). The first mechanism is to create fogs with looppaths. The second mechanism creates fogs in the real source noderegion as well as many interference fogs in other regions of thenetwork. In addition, the fogs are dynamically...
Wireless Sensor Network (WSN) is a wide network consisting of a large number of sensor nodes in it. WSN is used mainly for environmental monitoring and data aggregation purpose. The main aim of an adversary is to attack the sink node which is the aggregation point for the whole WSN. So, first there comes a need to provide the privacy to sink location from the adversary. In this paper, we modified...
The number of devices connected to the Internet of Things (IoT) has steadily been increasing over the last years and so has the variety of applications. There is no sign for this trend to weaken. A broad subset of them imposes requirements on attributes, such as availability, reliability, safety and many more. These attributes are commonly subsumed under the term dependability. In this paper we first...
The evolution of digital communication era includes both devices and applications running on different platforms. Specifics applications are needed for a safeguard communication ensuring protection and trust services to the users. The growing need to address privacy concerns when social network data is released for mining purposes has recently led to considerable interest in various network security-based...
Sensor nodes commonly rely on wireless transmission media such as radio frequency (RF) and typically run on top of CoAP and TFTP protocols which do not provide any security mechanisms. One method of securing sensor node communication over RF is to implement a lightweight encryption scheme. In this paper, a RF Simulator developed in our previous publication which simulates lightweight security protocols...
With the related applications of wireless sensor networks getting into our lives quickly, the research of WSN is growing more and more necessary. The most significant problem which threatens the successful deployment of sensor systems is privacy, there are many protocols providing the security of news content for the WSNs. However, due to the open feature of sensor networks, context information is...
Sensor networks are often used to collect data in the environment. Nodes are used to sense the environment and sinks can be used then to collect data from the nodes and transfer them to a backend server for processing, analysis and/or visualization. As sensor nodes can collect critical data (e.g. for medical or military purposes), security is a crucial issue. This article presents a novel mechanism...
Wireless Sensor Network is an important part of the Internet of Things. Data privacy preservation in wireless sensor networks is extremely urgent and challenging. To address this problem, we propose in this paper a privacy-preserving data aggregation protocol in wireless sensor networks. Compared to the previous research, our protocol protects the actual data from other nodes based on a rotation scheme...
Wireless sensor network is an important part of the Internet of Things. Preservation of privacy and integrity in wireless sensor networks is extremely urgent and challenging. To address this problem, we propose in this paper an efficient and secure range query protocol in two-tiered wireless sensor networks introducing master nodes. Our proposal not only prevents adversaries from gaining sensitive...
A formal analysis of a key management protocol, called LEAP (Localized Encryption and Authentication Protocol), intended for wireless sensor networks is presented in this paper. LEAP is modeled using the high level formal language HLSPL and checked using the AVISPA tool for attacks on the security and authenticity of the exchanges. We focus on the protocol's establishment of pairwise keys for nearest...
A formal analysis of a key management protocol, called LEAP (Localized Encryption and Authentication Protocol), intended for wireless sensor networks is presented in this paper. LEAP is modeled using the high level formal language HLSPL and checked using the AVISPA tool for attacks on the security and authenticity of the exchanges. We focus on the protocol's establishment of pairwise keys for nearest...
Wireless sensor networks (WSNs) play an increasing role in a wide variety of applications ranging from hostile environment monitoring to telemedicine services. The hardware and cost constraints of sensor nodes, however, make sensors prone to clone attacks and pose great challenges in the design and deployment of an energy-efficient WSN. In this paper, we propose a location-aware clone detection protocol,...
Due to the broadcasting nature of wireless sensor networks, it is relatively easy for an adversary to discover the sinks' location through traffic volume analysis. Traditional encryption and authentication methods are not effective to preserve privacy of a sink's location from a global adversary, capably of monitoring the traffic activity of the network. In this paper, we propose the Sink Location...
For sensor networks deployed to collect and transmit events into a sink node, sink anonymity is a critical security property. Traditional encryption and authentication are not effective in terms of preserving the sink's location because attackers can determine its location through traffic analysis. In this paper, we propose an easy to implement Concealing of the Sink Location (CSL) technique, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.