The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years the spectrum of wireless sensor network applications has grown dramatically. Sensor nodes range from very cheap nodes for control dominated applications like temperature, pressure, area and health monitoring to more powerful and sophisticated nodes used for audio and video surveillance. Implementing a low power hardware/software platform for computationally intensive applications such...
The Wireless Sensor Node serves as one of the crucial components needed for various wireless applications and services in the modern environment. As Wireless Sensor Networks (WSN) becomes more popular due to benefits they bring such as in smart home systems, transportation, military and etc, security issues emerge because this platform generally exposed to too many potential threats such as physical...
Recent advancements in micro-computing have provided an exponential increase in the capabilities of a wide range of devices and have allowed the implementation of complex mobile wireless sensor networks (mWSNs). Common battery-powered sensor nodes require security techniques that eliminate redundant processing overhead for resource conservation, without compromising the overall network performance...
Wireless sensors are low power devices with small transmission range, restricted computation power, limited amount of memory and with portable power supply. Wireless Sensor Network (WSN) is a collection of such sensors where the number of sensors can vary from few hundreds to thousands. Performing secure pair-wise communication between sensors is a really difficult task due to inherent characteristics...
We have previously shown that the first stage scheme is effective in the detection of physical capture attacks in wireless sensor networks. Like most existing detection schemes, our scheme relies upon message passing. Regular message passing consumes considerable energy. In this paper the first stage scheme is integrated with a novel sleep/wakeup mechanism, which is completely pre-scheduled based...
Wireless Sensor Networks (WSNs) are a valuable technology to support countless applications in different areas. Given the WSN nodes resource constrained characteristics, designing energy-aware applications, communication protocols and security mechanisms are critical. The operating system (OS) running on the WSN node also interferes with the node overall behavior, and its energy consumption. In this...
Wireless sensor networks represent a fascinating domain, with a wide area of applications in various environments. For this reason, in the world of wireless networks professionals, there is a major interest concerning the security issues in network communication and data flow between a sensor network and other types of intelligent devices. This paper proposes a new intrusion detection system approach...
This paper presents the performance analysis of Wireless Sensor Network (WSN) used in the high-end applications such as weapons sensor ship, biomedical applications, habitat sensing and seismic monitoring. Recently WSN also focuses on national security applications and consumer applications. This project shall demonstrate the performance of WSN models, which have been developed using PIC. Temperature...
Some of the main challenges that Wireless Sensor Networks (WSNs) face are reliability, flexibility and security. When WSNs deployed in remote locations need to be reprogrammed, environmental conditions often make it impossible to physically retrieve them. Over the Air Programming (OAP) plays an important role in achieving this task. Several platform dependent protocols have been developed for OAP...
Key management is considered as the fundamental part of any secure communication. A secure wireless sensor network communication protocol relies on an efficient key management system. In sensor networks some random pre-distribution schemes are proposed for key management protocols. Connectivity and resiliency are two important criteria in key management. There is a trade-off between connectivity and...
Due to the poor physical protection of sensor nodes, it is generally assumed that an adversary can capture and compromise a small number of sensors in the network. In a node replication attack, an adversary can take advantage of the credentials of a compromised node to surreptitiously introduce replicas of that node into the network. Without an effective and efficient detection mechanism, these replicas...
A sensor network is applied to various fields from the special application fields such as wild environment monitoring, industrial machine measurement, and military-purpose measurement to the daily application fields such as fire monitoring and pollution monitoring. A Wireless Sensor Network is a wire and wireless network, which consists of several sensor nodes deployed in a certain field. A sensor...
Sensors' locations are important to many wireless sensor networks (WSNs). When WSNs are deployed in hostile environments, two issues about sensors' locations need to be considered. First, the attackers may attack the localization process to make the estimated locations incorrect. Second, since sensor nodes may be compromised, the base station may not trust the locations reported by sensor nodes. Researchers...
Security is a key consideration when deploying wireless sensor networks (WSNs). Since the battery life confines the lifetime of a sensor node, power consumption is normally set as the first priority in developing security solutions. Due to the hardware resources constraint, lightweight cryptographic primitives are often implemented on sensor networks for ultra low power consumption. Apart from the...
There are many security threats in WSN, such as malicious nodes on the transmission paths dropping, fabricating or tampering the forwarded messages. Most of the existing security methods relied on special hardware facilities, mechanism of node monitoring, encryption and authentication technology, which greatly increase the sensorpsilas price or computing and communicating cost in WSN. In this paper,...
Running strong cryptographic algorithms on wireless sensor nodes is extremely difficult due to their limited resources. Hardware accelerators are a suitable means to speed up the computation and reduce power consumption. The drawback of crypto ASICs is the loss of flexibility. In this paper we will shortly introduce a modular design of elliptic curve accelerators which allows to be adjusted to several...
This paper has discussed an advanced concept for highly dependable wireless sensor network poles for security under harsh environments. It incorporates inherent sensor health monitors which monitor the environment which are crucial for its reliability.
Localization in wireless sensor networks is vulnerable to wormhole attacks, in which adversaries record beacon messages at one position, transmit them through a wormhole tunnel and replay at another location. Some existing schemes against wormhole attacks either require special hardware or increase computation/communication overhead on sensors. In this paper, we propose a lightweight dynamic anchor...
The wireless sensor network discussed in this article is one with Web interface based on radio frequency connection, information-driven star topology and energy-saved mode are used, the energy of each sensor node is reduced and secure management of each sensor node is improved.
As the networking technology greatly advanced in past decades, wireless sensor networks (WSN) have been widely deployed and utilized in various areas. Security issues on WSN devices thus draw much attention. In order to ensure the security of IEEE802.15.4 WSN and to fulfill the strict limitations of area and energy, we propose an efficient scheme for AES-CCM architecture. We implement AES-CCM by taking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.