The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The existing privacy-preserving data aggregation methods in wireless sensor networks (WSNs) generally rely on a network infrastructure, and data privacy is achieved by encryption techniques. However, such an infrastructure is very susceptible to the dynamic network topologies, and excessive encryption process causes a high energy consumption and re-duces the accuracy of the aggregation results. In...
Internet Protocol version 6 (IPv6) over Low power Wireless Personal Area Networks (6LoWPAN) is extensively used in wireless sensor networks (WSNs) due to its ability to transmit IPv6 packet with low bandwidth and limited resources. 6LoWPAN has several operations in each layer. Most existing security challenges are focused on the network layer, which is represented by its routing protocol for low-power...
In Wireless Sensor Networks, topology management guarantees energy efficiency and maintains the connection among the nodes.Most of the existing systems are not providing trust among the sensor nodes.Therefore,issues in security should also be considered in the management of topology in WSN.To overcome the above problem,in this paper,we propose (TBR) a TRust Based Routing with Topology management.Moreover...
Wireless Sensor Network solve the problem of various applications like military, nuclear power plant. This type of application required continuous monitoring, hence security is required for such network. WSN is affected by many attacks, wormhole and selective forwarding attacks are of them. In selective forwarding attack, attacker may refeuse or forward certain messages and simply drop them. In wormhole...
Wireless technology having great application in office, home and business automation and it is a prominent field of research. ZigBee is built on the top of IEEE 802.15.4 standard for communication in wireless personal area network (WPAN). ZigBee is having feature of low cost of implementation, ease of access, low data over IEEE 802.15.4 standard and other traditional wireless network. ZigBee is mess...
Research and standardisation efforts in the fields of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) are leading towards the adoption of TCP/IP for deployments of networks of severely constrained smart embedded objects. As a result, wireless sensors can now be uniquely identified by an IPv6 address and thus be directly connected to and reachable from the internet. This has a series...
Internet of Things (IoT) have emerged as a valuable, flexible, and interoperable network of devices, objects, items, and electronics. Fuelled by recent advances in networking, communications, computation, software, and hardware technologies, IoT has stepped out of its infancy and is considered as the next breakthrough technology in transforming the Internet into a fully integrated Future Internet...
Control systems behavior can be analyzed taking into account a large number of parameters: performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect in lower or higher measure its functioning. In this paper the authors present a method to assess the impact of security issues on the systems availability. A fuzzy model for estimating...
A distributed topology management scheme in wireless multimedia sensor networks (WMSNs) ensures coverage of an event, prolongs network lifetime, and maintains connectivity between camera sensor (CS) nodes. However, the deployment of WMSNs in unattended environments makes the nodes vulnerable to security attacks. Hence, security issues should be considered, along with topology management, in WMSNs...
Wireless sensor and actor networks (WSAN) show broad prospect for future application in many fields such as industry and transportation. However, such issues as heterogeneity, mobility, energy consumption and topology pose challenges to efficient operation of WSAN. Software Defined Network (SDN) is a novel technique that is easy and effective to configure networks in a centralized and programmable...
Wireless Sensor Networks (WSNs) are constrained by a limited energy sources. Trust in a WSN is defined as the amount of confidence obtained from the individual node with respect to its data collecting, composing and communication (C3) probability with other peered nodes. Trustworthiness and energy optimization of Wireless Sensor Networks (WSNs) is an active research topic. Trustworthiness of a WSN...
Trust and reputation management represents a significant trend in tackling the security problems in computer networks. The basic idea is to let machines rate each other and then use the aggregated ratings to derive trust scores, which can assist machines in deciding whether to collaborate or not in the future tasks. Recently there are rapidly growing research literatures on trust management but these...
The autonomous features of wireless sensor network (WSN) and the rapid deployment of smart metering devices have revolutionized the smart grid infrastructures. These developments have driven the WSN-based smart metres for automatic recording, processing and evaluating energy information, and managing efficient energy usage. The smart metres are not limited to monitoring and processing energy information...
The increasing popularity of wireless sensor networks and IPv6 technology is creating varieties of applications for wireless sensor networks based on IPv6. However, IPv6-based Wireless sensor networks are vulnerable to a harmful attack known as the wormhole attack, where a malicious node overhears data packet at one location and tunnels it to a colluding node, which replays it locally. This can have...
Security issues for Wireless sensor network (WSN) is always crucial due to its nature. The limitation of computing resources and distributed properties in WSN makes the traditional security mechanisms no longer as feasible in protecting WSN as in wired networks. There is an emerging research area to discover the alternative solutions on trust and reputation mechanisms for WSNs nowadays. The recent...
Virtual Coordinate (VC) based Wireless Sensor Networks (WSNs) are susceptible to attacks resulting from malicious modification of VCs of individual nodes. While the impact of some such attacks is localized, others such as coordinate deflation and wormholes (tunneling) can cause severe disruptions. A comprehensive solution for detection of such attacks is presented that combines Beta Reputation System...
The recent advancements in the field of Wireless Sensor Networks (WSN) make the sensors smaller, cheaper and more energy efficient. These innovations made it attractive to use sensor networks in new applications like Border monitoring, Railway track monitoring, Oil and Gas pipeline monitoring etc. In the above mentioned applications, a common characteristic is their linear topology. Since last few...
This paper deals with the design and implementation of security mechanisms in networked embedded systems (e.g. Wireless Sensor Networks (WSN)), without the support of external “resource unconstrained” facilities. While most literature contributions propose to put intelligence (that is usually more consuming both in computational resources and in memory as well) outside the WSN, we have already reported...
Security is becoming a major concern for many mission-critical applications wireless sensor networks (WSNs) are envisaged to support. This is because WSNs are susceptible to various types of attacks or to node compromises that exploit known and unknown vulnerabilities of protocols, software and hardware, and threaten the security, integrity, authenticity, and availability of data that resides in these...
In this paper, we present CENTER, a CENtralized Trust-based Efficient Routing protocol for wireless sensor networks (WSN). CENTER is a secure and efficient routing protocol that utilizes the powerful sink base station (BS) to identify and ban different types of misbehaving nodes that may interrupt or abuse the functionality of the WSN. In CENTER, the BS periodically accumulates simple local observations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.