The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nerve Net is a concept of regional wireless access platform where multiple service providers can provide their own services with the shared use of the network and sensors, making various context-aware services practical. It works as the nervous system of the human beings. Densely located, interconnected access points with database and data processing unit will provide mobility to terminals without...
We present and compare architectures for using a fleet of high-speed Internet subscriber residential gateways to build a hotspot network for offload of cellular data-traffic. We address the central challenges of meeting the security and ease of use expectations of cellular telephony in implementation on popular smartphones and gateways. Attention is given to security shortcomings in the client software...
Whilst security is generally perceived as an important constituent of communication systems, this paper offers a viable security-communication-tradeoff particularly tailored to Advanced Metering Infrastructures (AMIs) in Smart Grid systems. These systems, often composed of embedded nodes with highly constrained resources, require e.g. metering data to be delivered efficiently whilst neither jeopardizing...
Key management is one of the most important issues of any secure communication. With the increasing demand for the transmission security in wireless sensor networks (WSNs), it is urgent to introduce the secure and reliable key management scheme into the WSNs. In this paper, we proposed a hierarchical key management scheme to ensure the security of the network services and applications in WSNs. Comparing...
Wireless mesh networks (WMNs) is a new type of network paradigm in which each node is communicates to others to enhance network reliability and performance. Multimedia communication in wireless mesh network is a challenging task. The concept of field based routing (FBR) is gaining the popularity because it uses a little information to route the packets. These routing algorithms are robust, inexpensive...
Wireless mesh network is a new type of network paradigm in which each node communicates to others to enhance network reliability and performance. Routing in wireless mesh network is a challenging task. Despite from the traditional routing, field based routing uses a little information to route the packets. Due to this characteristic, field based routing algorithms are inexpensive and robust, but such...
WirelessHART is the first open standard for wireless sensor networks designed specifically for industrial process automation and control systems. WirelessHART is a secure protocol; however, it relies on a Security Manager for the management of the security keys and the authentication of new devices. The WirelessHART standard does not provide the specification and design of the Security Manager. Also,...
The combination of the wireless sensor network (WSN) and grid computing in wireless sensor grid (WSG) architecture enables the strengths and characteristics of wireless sensor network and grid computing to be realized on a single integrated platform. This paper analyzes the necessity and key problems of combining the WSN and grid computing and shows a sensor grid architecture which is based on an...
The term Evil Twin refers to a type of rogue wireless access point that appears to be legitimate, but is set up for the purpose of intercepting traffic between mobile users and the Internet. This paper generalizes a known technique into a model we call ldquoend-to-middle security,rdquo which can be adopted by mobile users to protect against Evil Twin attacks. This model involves using a virtual gateway...
The last decade has seen explosive growth in the development of mobile applications. This has increased the demand on the wireless communication services. The capability to achieve wireless access anywhere, anytime, and anyplace has become common expectation as it provides significant flexibility and freedom in mobility. But to achieve global mobility in heterogeneous networks for any mobile device...
Mobile commerce (m-commerce) has dramatically changed our lives, while it has also posed challenges for individuals and businesses. One of the big concerns of m-commerce is security. In addition to the security issues of wired Internet, there are some special security demands for doing business over the wireless Internet, due to the limitations of wireless networks and mobile devices. This paper first...
The existing security systems show many shortcomings such as difficult to extend and severe time-consuming because it is based on wiring network technology. In this paper, we present a wireless networked security system based on ZigBee technology. The system adopts hybrid topology structure based on cluster, which consists of many micro-sensor nodes, network coordinator nodes, network gateway (router),...
An emerging trend among automobile manufacturers is to introduce wireless technology in the vehicles. By allowing wireless communication, real-time information exchange between vehicles as well as between infrastructure and vehicles becomes a reality. This communication allows for road condition reporting, decision making, and remote diagnostics and firmware updates over-the-air, creating a complex...
This paper presents the security strategy used by WAP and I-Mode. It includes security transport protocol, the type of certificate, the performance of gateway, smartcard and authenticate scheme. It will first be illustrated from the architecture, and then discussed application situation. All of these schemes of WAP will be compared with the similar adopted technology of I-Mode. Through comparing,...
In this paper, we propose a secure embedded gateway system for a wireless sensor network that provides secure wireless and wire communication channels for wireless sensor nodes and applications in the Internet, respectively. It also has security functions such as key management, access control and secure wireless network configuration for wireless sensor nodes and secure query process for its applications...
Anomaly detection in wireless sensor networks is an important challenge for tasks such as fault diagnosis, intrusion detection, and monitoring applications. The algorithms developed for anomaly detection have to consider the inherent limitations of sensor networks in their design so that the energy consumption in sensor nodes is minimized and the lifetime of the network is maximized. In this survey...
Wireless Mesh Networks are a scalable and cost-effective solution for next-generation wireless networking. In the present work, we consider the Round Weighting Problem (RWP) which solves a joint routing and scheduling problem to satisfy a given demand subjected to the multi-access interferences. We propose a multiobjective approach that deals with two objectives. The first one is to balance the load...
The World Wide Web (WWW) has enjoyed phenomenal growth over recent years. It has been widely embraced as a standard infrastructure over which a variety of applications can be deployed. We are witnessing a growing number of professionals relying upon the Internet to perform their work. Collaboration tools enable teams of workers in disparate locations to work together using a variety of approaches...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
This paper discusses the problem of achieving bandwidth and energy-efficient neighborhood group key distributions (NGKD) in tactical wireless sensor networks (TWSNs). We present new techniques that improve NGKD performance while also improving the resilience of TWSNs against attacks that combine node capture with message interception. This is accomplished without introducing additional communications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.