The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: advanced communication technology; wireless communication technology; mobile communication; RFID technology; USN technology; home network technology; wireless sensor network; optical networking technology; distributed computing; game technology; multimedia technology; information security technology; next generation network technology; network management; network...
Node capture attack is a critical issue in Mobile WSNs where attacker-controlled replicas may act maliciously. In this paper, we present a novel Chinese remainder theorem based node capture resilience scheme that can be utilized to discover and revoke captured nodes. Moreover, our scheme can limit the ability of captured nodes to further compromise forward security, backward security, and launch collusion...
Constructing sensing barriers using wireless sensor networks has important applications in military operations and homeland security. The goal of forming a sensing barrier is to detect intruders attempting to cross the network. Early studies often assume that sensors remain static once deployed. We note that barrier gaps may occur at deployment if sensors are deployed at random. Barrier gaps may also...
Key management poses a main concern for security operation in wireless sensor networks. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors in homogeneous sensor networks. In recent, some research has demonstrated that heterogeneous sensor networks can achieve better performance in security than homogeneous networks. In this paper we propose a key- chain...
The wireless data collected in mobile environments provides tremendous opportunities to build new applications in various domains such as Vehicular Ad Hoc Networks and mobile social networks. One of the biggest challenges is how to store these data. Storing the data decentralized in wireless devices is an attractive approach because of its major advantages over centralized ones. In this work, to facilitate...
As wide applications of wireless sensor networks, privacy concerns have emerged as the main obstacle to success. When wireless sensor networks are used to battlefield, the privacy about sink-locations become a crux issue. If sink location will be exposed to adversary, the consequence is inconceivable. In this paper, a scheme based on local flooding of source and greedy random-walk of sink is proposed...
Denial-of-Service (DoS) attacks are recognized as a biggest threats due to the resources constrained property in wireless sensor networks(WSN). Especially, using some mobile nodes, we can attack the cluster heads in clustering network, this jamming can cause a serious damage in performance of WSNs. Because the cluster head collect and fuse the data from all nodes in cluster, and forward to the base...
Wireless sensor networks are often deployed in harsh environments, where the adversary is able to capture certain sensors. Once a sensor is compromised, the adversary can easily replicate it and deploy several replicas back into the network for further malicious activities. Although a number of protocols have been proposed to tackle such node replication attacks, few of these schemes are suitable...
In Unattended Wireless Sensor Networks, data are stored locally and wait for a sink to offload. Since there is no real time communication between the sensors and the sink, a powerful mobile adversary can corrupt the collected data between the sink visits. In this paper, we propose simple and effective algorithms to limit data corruption in homogeneous unattended wireless sensor networks, without implementing...
With the rapid proliferation of wireless sensor networks, data are becoming easily obtainable. While the information is very useful in many aspects, privacy concern is also becoming more challenging, especially when we face more and more serious security and privacy threats. In these privacy concerns, location privacy is a very interesting yet difficult issue. To date, existing research commonly focus...
We demonstrate that the network flux over the sensor network provides us fingerprint information about the mobile users within the field. Such information is exoteric in the physical space and easy to access through passive sniffing. We present a theoretical model to the network flux according to the statuses of mobile users. We fit the theoretical model with the network flux measurements through...
The following topics are dealt with: performance modelling; routing mechanism; distributed systems; parallel systems; service oriented architecture; communication technology; protocols; autonomic network systems; Internet computing; ad hoc networks; wireless sensor networks; privacy management; mobile networks; multimedia systems; pervasive computing; ubiquitous computing; security intrusion detection;...
Cognitive Radio (CR) has been considered as a promising concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. As cognitive radio network (CRN) is a general wireless heterogeneous network, it is very essential for detecting the misbehaving or false nodes in the network. So in this paper we propose a trust aware model which...
Wireless Sensor Networks (WSN) consists of sensor nodes that are networked and are deployed in unattended areas where security is very important. Security is considered as one of the vital issues in the area of sensor networks. This work proposes an efficient scheme that deals with the availability of a mobile node and introduces a session time within which the secured secret key remains valid. The...
Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that are immobile and have pre-defined communication patterns. We argue that node mobility is a realistic characteristic of sensor nodes that needs to be taken into consideration in future...
Wireless mesh networks (WMNs) is a new type of network paradigm in which each node is communicates to others to enhance network reliability and performance. Multimedia communication in wireless mesh network is a challenging task. The concept of field based routing (FBR) is gaining the popularity because it uses a little information to route the packets. These routing algorithms are robust, inexpensive...
Recently the problem of providing effective and appropriate healthcare to elderly and disable people is an important field in relative to the aging of population problems. The objective of information and communication technologies (ICT) is to focus on the new technologies the medical environments, so that it can provide management to accelerate and improve the clinical process. Our contribution is...
The following topics are dealt with: optimization; mobile ad hoc networks; adaptive control; autonomous systems; information processing; healthcare; middleware; multimedia processing; radio frequency identification; sensor network security; structural health monitoring; and wireless sensor networks.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.