The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks (WSNs) have been widely used, most notably in real-time traffic monitoring and military sensing and tracking. However, WSN applications could suffer from threats and endanger the applications if the suitable security issues are not taken into consideration. As a result, user authentication is an important concern to protect data access from unauthorized users. This paper presents...
Research into the security of the Internet of things is increasingly attracting the attention of the scientific community. This study examines three key security requirements, with an emphasis on Internet systems of things: authentication, privacy and access control. Attention is focused on security issues that have not been resolved to date, and also addresses the problems and future trends in the...
The revolutionary network that totally changed how the humankind life, the Internet, is now evolving into the Internet of things; which is being achieved by fetching the network connectivity to legacy industrial or commercial devices, as well as everyday objects. This connectivity may be an Internet connection, where the Internet protocol and related technologies are in use. But, there are also many...
The IoT is a technology that enables the inter-connection of smart physical and virtual objects and provides advanced services. Objects or things are generally constrained devices which are limited by their energy, computing and storage capacity. A Wireless Sensor Networks (WSN) is a network composed of devices managed by a CPAN (Personal Area Network Coordinator). The network is used in order to...
In recent decades, the significant expansion and popularity of wireless sensor networks in various applications have attracted the attention of many researchers. Energy and security restrictions are main challenges for the researchers. The application of these networks in inaccessible and dangerous environments and wireless communications between nodes have led them to be subjected to direct attacks;...
This work presents a novel scheme which reinforces strength of encryption keys in low-power and low-rate wireless sensor networks (WSNs). The proposed algorithm utilizes pseudo-random features of physical layer (PHY) of the communication stack to enable time-evolution of network keys increasing their complexity and reliability. This scalable and light-weight scheme is suitable for large networks of...
During the last few years critical advancements in Wireless Sensor Networks (WSNs) have highlighted respective platforms as a prominent technology able to tackle various challenges posed by Smart-City application scenarios. Through their communication paradigm and platform versatility WSNs are able to meet increasingly demanding communication requirements. However, a critical area that has not been...
During the last few years critical advancements in Wireless Sensor Networks (WSNs) have highlighted respective platforms as a prominent technology able to tackle various challenges posed by Smart-City application scenarios. However, a critical area that has not been adequately taken into consideration concerns security provision necessity in conjunction to its impact on real WSN platform communication...
The existing privacy-preserving data aggregation methods in wireless sensor networks (WSNs) generally rely on a network infrastructure, and data privacy is achieved by encryption techniques. However, such an infrastructure is very susceptible to the dynamic network topologies, and excessive encryption process causes a high energy consumption and re-duces the accuracy of the aggregation results. In...
Security is the main challenge in the design and implementation of today's ubiquitous interconnected objects on the Internet network infrastructure. Many security solutions have been already proposed to address security concerns for IoT enabled devices. In this paper, an integrated approach for authentication and access control is presented for communication with wireless sensor nodes in IoT networks...
Wireless Sensor Networks (WSNs) gives the loaded advantages of ad hoc and flexible network deployments in an uncontrolled environments. Revealing of any information communicated is not desirable in any mission critical applications. There are methods to provide securities for these applications by implementing cryptographic methods. However due to their resource constraint nature, public-key cryptography...
There is an increase in the diseases of the circulatory system in United Arab Emirates, which makes it the first leading cause of death. Therefore, there is a high demand for a continuous care that can be achieved by adopting an emerging technology of e-Health monitoring systems using Wireless Body Area Network (WBAN) that can collect patient's data. Since patient's data is private that makes securing...
A wireless sensor network (WSN) is generally deployed in an uncontrolled environment where it can be the target of many security attacks trying to compromise its normal operation. Consequently, providing security for data exchanged in a WSN is one of the main requirements to allow the accomplishment of its mission. This paper, proposes a location-aware key authentication and distribution mechanism...
The rapid production, huge increasing features and capabilities of mobile sensing devices such as smart phones increases usage of variety of mobile sensing application. As WSN is having huge coverage area, data is collected from multiple mobile users. For this huge amount of data, statistics needs to be periodically updated for applications such as population monitoring, temperature monitoring and...
In wireless sensor networks (WSNs), Security is critical for many sensor network applications, such as military target tracking and security monitoring. In particular, providing authentication to small sensor nodes is challenging, due to the limited capabilities of sensor nodes in terms of computation, communication, memory storage, and energy supply. Therefore, the implementation of authentication...
Public key cryptography has been considered too expensive, in terms of resource requirements, for applications within personal area networks and larger wireless sensor networks. Approaches based on public key cryptography for encryption/decryption and key generation respectively have been overlooked as the devices have been considered too low power or resource scarce. In recent times with the explosion...
The paper presents a survey and analysis on the current status and concerns of Internet of things (IoT) security. The IoT framework aspires to connect anyone with anything at anywhere. IoT typically has a three layers architecture consisting of Perception, Network, and Application layers. A number of security principles should be enforced at each layer to achieve a secure IoT realization. The future...
The increasing popularity of wireless sensor networks and IPv6 technology is creating varieties of applications for wireless sensor networks based on IPv6. However, IPv6-based Wireless sensor networks are vulnerable to a harmful attack known as the wormhole attack, where a malicious node overhears data packet at one location and tunnels it to a colluding node, which replays it locally. This can have...
A wireless sensor network consist several sensor nodes, which are resource constraints device with low processing, energy and storage capabilities. WSN can be used to measure and monitor many challenging problems and typically involve in monitoring and controlling areas such as battlefield monitoring, object tracking etc. In Wireless sensor network security and economy of total energy are two important...
At the present study, in order to ease analysis of real time data and to ease sharing data, combination of wireless sensor network and cloud computing has been applied. In addition, in order to be able to support large amount of data and in order to meet limitations of wireless sensor networks in regard with ability to process and acceleration of communications, cloud computing would be applied. Here,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.