The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent decades, the significant expansion and popularity of wireless sensor networks in various applications have attracted the attention of many researchers. Energy and security restrictions are main challenges for the researchers. The application of these networks in inaccessible and dangerous environments and wireless communications between nodes have led them to be subjected to direct attacks;...
Wireless sensor network will become isolated in various associated segments because of the disappointment of some of its hubs, which is known as a “cut”. In this paper, authors acknowledge the issue of distinguishing cuts by the remaining hubs of a wireless sensor network. System proposes an estimation which grants every hub to identify at the time of accessibility to an extremely assigned hub has...
In large scale Wireless Sensor Network the network owner and the users of the sensor network may be different. A distributed access control module allows the users to access data from the network for which the user has privileges. The users of such a network required the privacy of their identity and access patterns from the network and other users. To support this user privacy previous works proposed...
A major issue in many applications of Wireless Sensor Networks (WSNs) is ensuring security. Particularly, in military applications, sensors are usually deployed in hostile areas where they can be easily captured and operated by an adversary. Most of security attacks in WSNs are due to the lack of security guaranties in terms of authentication, integrity, and confidentiality. These services are often...
Wireless Sensor Network (WSN) is a collection of sensor nodes that involve in gathering of happenings from a nodes' surrounding. They help in supervising all the mission critical applications instead of depending on humans in monitoring cynical areas. Sensor nodes play a important role in alerting us any distinct changes that occur in the sited area and is prone to innumerous attacks. These attacks...
As Wireless Sensor Networks (WSN) continue to grow, so does the need for effective security mechanisms. Enhancing the efficiency of these networks requires more security to provide integrity, authenticity and confidentiality of the data flowing through the network. Encryption is one of the most common tools used to provide security services for WSNs. There has been an enormous research potential in...
Wireless Sensor Networks (WSNs), comprising of tiny nodes with limited energy, computational and communication resources, are being widely used in various application areas ranging from pollution and weather monitoring to military. Even though every application may not require data to be exchanged in a secure manner, few WSN applications may have certain security requirements. The data is encrypted...
Wireless Sensor Networks (WSNs) are used in many applications in military, environmental, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory,...
A major issue to secure wireless sensor networks is key distribution. Current key distribution schemes are not fully adapted to the tiny, low-cost, and fragile sensors with limited computation capability, reduced memory size, and battery-based power supply. This paper investigates the design of an efficient key distribution and management scheme for wireless sensor networks. The proposed scheme can...
<?Pub Dtl?>Recently, considerable research has been performed in cryptography and security to optimize the area, power, timing, and energy needed for the point multiplication operations over binary elliptic curves. In this paper, we propose an efficient implementation of point multiplication on Koblitz curves targeting extremely-constrained, secure applications. We utilize the Gaussian normal...
Modern day scientific society has seen the emergence of various trends in research and implementation. Wireless Sensor Network (WSN) is one among those research trends that has emerged, but its progress has been dammed by the security concerns due to certain limitations in resource and energy scarcity. In this paper we have analysed the performance of certain common well known security schemes like...
In order to guarantee the privacy and safety of data transactions in Wireless Sensor Networks (WSNs), secure key transportation and unique node identification have become major concerns. WSNs are deployed in a wide range of applications with a high demand for secure communications. When designing a secure key management protocol for WSNs, special attention should be given to the resource constraints...
The security issue in wireless sensor network is still a question that requires an efficient solution to be given. The security breaches and loopholes highly maximize the susceptibility of both internal as well as external attack in wireless sensor network. Hence, the phenomenon of data aggregation should be incorporated with an optimal security that performs robust communication security before and...
Wireless Sensor Networks (WSN's) are being widely used in various civilian and military applications. In certain WSN applications, the data among the nodes and the Base Station (BS), needs to be exchanged in a secure manner. The encryption and decryption operations over the data involve additional energy overhead. Hence, it is required to use a security model, which offers security with less computational...
The importance of sensitive information carried and exchanges by wireless sensors in many applications helped develop a plethora of protocols and algorithms essentially to secure data for their aggregation in wireless sensor networks (WSNs), among which the the elliptic curve cryptography (ECC) with homomorphic properties allowing users to execute operations on encrypted metrics values. From the low...
Security aspects in wireless sensor networks is getting more and more attention in the recent years. Wireless sensor networks are being considered for critical applications where the security issues are a priority. The limited capacities of wireless sensor nodes and the complex algorithms of the security protocols make the subject challenging. Security algorithms are divided into two main families:...
In this paper, we evaluate the performance of our Advanced Two Tier User Authentication (ATTUA) scheme [5] which is proposed for heterogeneous Wireless Sensor Networks. ATTUA scheme employs both Public Key Cryptography (PKC) and Secret Key Cryptography (SKC) approaches, such that it takes advantage of both schemes. Our analysis and simulation results have shown that, ATTUA scheme is not only more...
Wireless Sensor Networks (WSNs) consists of a large number of small and resource constrained devices. Due to their low cost, flexibility and self-organizing nature, these devices are used in various applications such as home and industrial automation, environmental and habitat monitoring and even in more security sensitive military applications in which security of the information in terms of both...
The security aspect of wireless sensor networks has taken the attention of numerous researchers in the past several years. It has recently been proven that public keys are now feasible in wireless sensor networks but still consume a lot of processing time and memory. In this paper we propose the use of public keys based on ECC to exchange symmetric keys that will be used to encrypt communications...
Wireless Sensor Networks are limited in their energy, computation and communication capabilities. In contrast to traditional networks, sensor nodes are often deployed in inaccessible areas, presenting a risk of physical attacks. A secured system can be achieved only if the security is integrated into each and every component. Otherwise the unsecured components become a point of attack. Thus security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.