The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider a wireless sensor network secured by a heterogeneous random key predistribution scheme and investigate its reliability against both link and node failures. The heterogeneous random key predistribution scheme is a lightweight security mechanism proposed to secure sensor networks that include nodes with varying levels of resources, features, or connectivity requirements; e.g., regular nodes...
Wireless Sensor Network (WSN) has emerged as useful alternative to provide prompt communication services in mission critical applications such as post disaster relief operations where reliably data delivery in timely manner is utmost important. However, unsupervised nature of such environments makes security of node vulnerable and exposes them various threats such as damage, physical capture and node's...
In today's digitized era almost all data is transferred digitally which is very easy and advantageous but it also has some shortcomings i.e. the security of this data is very important. With the advent of wireless sensor networks in military regions, security of this secret data is very crucial. So Security technique such as steganography can provide the need to be a lightweight and energy efficient...
Advances in wearable and implementable of wireless sensors have enable the development of tiny and intelligent sensors called body sensors. Monitoring the vital body parameters in real-time using wireless body area network (WBAN) has shown great potential in improving healthcare quality not only for patients but also for medical staff. However, security and privacy are still an important issue in...
In this paper, a novel approach for user authentication in Internet of Everything, called “wireless key” is studied. While the majority of existing solutions suggest a wireless key to be a battery-powered device with considerable computational power, we propose to use passive NFC tags instead. In our approach, all the computations are performed by the service the user is authenticating to and thus...
Counterfeiting is a major problem plaguing global supply chains. While small low-cost tagging solutions for supply-chain management exist, security in the face of fault-injection [1] and side-channel attacks [2] remains a concern. Power glitch attacks [3] in particular attempt to leak key-bits by inducing fault conditions during cryptographic operation through the use of over-voltage and under-voltage...
Predistribution schemes of cryptographic keys are recognized as appropriate solutions to secure communication in large-scale wireless sensor networks. Among various schemes, the seminal scheme proposed by Eschenauer and Gligor, and its extension introduced by Chan et al. have been widely studied in the literature. Yet, there is a lack of a formal analysis on how to control the parameters of the two...
A Wireless Sensor Network (WSN) is a wireless network which contains small sensor nodes to monitor physical or environmental conditions. When WSNs are deployed in inaccessible areas, the probability of occurring different types of attacks is very high. So the security of WSN becomes extremely important. As sensors have limited processing power, limited storage, low bandwidth, and energy; traditional...
As Sensor networks are being used in remote environment monitoring, healthcare, machine automation, security of these networks is becoming a central concern. Till now main concern was to make sensor networks useful and deployable and little emphasis was placed on security. This paper analyses security issues and vulnerabilities in wireless sensor networks. The paper gives an overview of various security...
The security issue of wireless Implantable Medical Devices (IMD) is an emerging area of research. The unique challenge here is that an IMD should be accessed by doctors with no authorization for emergency treatments while it still has to be protected from adversaries. In this paper, we propose a novel ECG-based Secret Data Sharing (ESDS) scheme in order to protect the IMD data privacy against eavesdropping...
We present a demonstration of a novel protocol for secure transmissions on a Ultra-wideband impulse radio that includes distance bounding. Distance bounding requires radios to be within a certain radius to communicate. This new protocol can be used in body area networks for medical devices where security is imperative. Many current wireless medical devices were not designed with security as a priority...
In this paper, we present an efficient and secure code dissemination technique aimed at sensor clouds. Previous code dissemination techniques were geared toward traditional wireless sensor networks. They did not take into account, the dynamic nature of a sensor cloud, where the applications running on the motes may not just be updated but changed completely in successive code disseminations. The technique...
Due to resource constrained environments under which the wireless sensor networks operate, the security algorithms should be so designed to be used in WSNs, as a result the optimum resources and less energy consumption. Security to sensor nodes is a particularly challenging task. The literature proposed extensions tiny encryption algorithm and discussed their countermeasures. The literature survey...
Near-field approximations to Maxwell's equations reveal an interesting property of inductively-coupled links that are so frequently used in wireless power transfer: observation disturbs the system. We propose theoretical strategies and include preliminary practical implementations that demonstrate how this property can be used to detect presence of an adversary/intruder/eavesdropper, and thereby secure...
In Mobile Unattended Wireless Sensor Networks (MUWSNs), nodes sense the environment and store the acquired data until the arrival of a trusted data sink. MUWSNs, other than being a reference model for an increasing number of military and civilian applications, also capture a few important characteristics of emerging computing paradigms like Participatory Sensing (PS). In this paper, we start by identifying...
Implantable and wearable medical devices (IWMDs) are commonly used for diagnosing, monitoring, and treating various medical conditions. A general trend in IWMDs is towards increased functional complexity, software programmability, and connectivity to body area networks (BANs). However, as medical devices become more “intelligent,” they also become less trustworthy - less reliable and more vulnerable...
Computing platforms are expected to be deeply embedded within physical objects and people, creating an {\em Internet of Things}. These embedded computing platforms will enable a wide spectrum of applications, including implantable and wearable medical devices, smart homes, smart meters, brain-machine interfaces, physical infrastructure monitoring, and intelligent transportation systems. Unfortunately,...
The involvement of smart grid in home and building automation systems has led to the development of diverse standards for interoperable products to control appliances, lighting, energy management and security. Smart grid enables a user to control the energy usage according to the price and demand. These standards have been developed in parallel by different organizations, which are either open or...
Wireless visual sensor networks for surveillance can dissipate their limited resources to process irrelevant images maliciously injected by compromised nodes. In particular, since nodes compromised by tampering reveal their security keys to encrypt messages, traditional data authentication techniques cannot identify false data deceivably encrypted by such stolen keys. To challenge this problem, this...
We describe a novel Distributed Key Establishment (DKE) protocol in Disruption (Delay) Tolerant Location Based Social Wireless Sensor and Actor Networks (DTLBS-WSAN). In DKE, we propose that sensor nodes use neighboring signatures to establish their keys. Pre-distributed keys are used by actor nodes to strengthen communication security. We show that nodes can get guaranteed security when actors are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.