The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, several code update approaches for multi-hop sensor networks have been proposed basically addressing two orthogonal problems: security and efficient over the air reprogramming. Unfortunately, the proposed security solutions for code update mechanisms are only considering early proposed over the air reprogramming solutions like e.g. Deluge or MOAP. Therefore, currently available symmetric...
The following topics are dealt with: protocols; wireless sensor networks; Web technology; optical networks; peer-to-peer computing; queueing theory; congestion control; IP networking; coding; WiMax; vehicular ad hoc network; and security.
In network communication, Byzantine attacks, i.e., attacks in consequence of the packet dropping and cheating (modified packets), are usually difficult to guard against. Several multi-path packet routing schemes have been recently proposed to recover lost packets on account of the packet dropping (caused by path failures or attacks), but no effective solutions have been proposed to counter cheating...
In this paper novel distributed universal compaction algorithm for support of multipoint to point or point to point transmission in opposite direction is presented. Most of the energy needed for executing the algorithm is used in receiving (supportive) node, which is supposed to have plenty of energy for transmission. It generates appropriate (supportive) sequence, which is received by a supported...
The following topics are dealt with: wireless communication; wireless networking; mobile computing; MIMO; OFDM; cognitive radio; signal processing; B3G systems; 4G systems; RFID; sensor networks; antenna; ad hoc networks; mesh networks; network protocols; multimedia systems; security systems; coding; and modulation.
The following topics are dealt with: cognitive radio; future internet research; service management; networking; source coding; network service; cooperative communication; wireless ad hoc networks; mesh networks; cryptography; ethernet; passive optical networks; MIMO systems; OFDM; OFDMA; elasticity; LDPC coding; wireless sensor networks; quality of service; random access; protocols; optical networks;...
There are many security threats in WSN, such as malicious nodes on the transmission paths dropping, fabricating or tampering the forwarded messages. Most of the existing security methods relied on special hardware facilities, mechanism of node monitoring, encryption and authentication technology, which greatly increase the sensorpsilas price or computing and communicating cost in WSN. In this paper,...
In signature based IDS (intrusion detection systems), if incoming packet header matches a certain set of rules, its payload is scrutinized against a set of known patterns (also called signatures). As the number of patterns could range up to thousands, pattern matching consumes not only the storage but also the most of the CPU cycles to execute the complex pattern matching algorithms. Therefore, so...
Network coding is promising to maximize throughput in various networking systems. Compared to normal network coding operated over large finite fields, XOR network coding has gained an increasing number of applications for its simplicity, especially in wireless networks. However, both types of network coding systems are vulnerable to pollution attacks in which the compromised forwarders inject polluted...
This paper has three objectives. The discussion of reliability and Chaos in the general context of reliability theory, including the reliability of Wireless Sensors Network (WSN, e.g., a prognostics sensors network in a PHM system), constitutes the first objective of this paper. The second objective discusses the WSN reliability and survivability inspired by the analogical similarity between insect...
We investigate the feasibility of achieving perfect secrecy in wireless network communications without shared secrets. We introduce a secure coding problem in which not only the sender but also the receiver participates in the coding. In essence, the receiver's role is to selectively jam the sender's transmission at the level of bits, bytes, or packets. We then design a class of secure codes, which...
A popular physical layer used in wireless sensor networks is the IEEE 802.15.4 standard, which provides for a single coding scheme with constant data rate regardless of channel properties and noise conditions. This paper proposes and simulates a simple steganography method to embed additional information in 802.15.4 data packets when link quality permits, with a modest increase in signal to noise...
The broadcast is the important communication mode. As a new data coding method, the linear network coding can improve the data throughput of the broadcast, decrease the energy consumption of the node and reduce the data delay. How to combine the linear network coding with the broadcast in WSN in security has become the hot issue. In the paper, we introduce two parts of our research. Firstly we present...
The following topics were dealt with: wireless sensor networks; MANET; WLAN; IEEE 802.11; MIMO; OFDMA; scheduling; mobility and resource management; Internet; localization; WiMax; coding; OFDM; media streaming; QoS; security; WiMob; cryptographic protocols; ad hoc networks security; broadband wireless access; wireless and mobile computing.
In this paper, we investigate the advantages of applying random network coding in sensor networks for security purpose. In particular, the problem of constructing a secure multi-path in wireless sensor networks is considered. However, unlike previous wiretapping scenarios, where the threat is posed by external wiretappers, we approach the security from an internal angle: all nodes comply with the...
The following topics were dealt with: electromagnetic compatibility; mobile wireless networks; QoS; ad hoc networks; RFID; protocols; multimedia system; virtual reality; signal processing; coding; telecommunications services; network operations and management; information infrastructure and security; communication theory; communication software.
We address the problem of pollution attacks in coding based distributed storage systems proposed for wireless sensor networks. In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original data upon retrieval. We propose algorithms to detect and recover from such attacks. In contrast to existing approaches...
Due to the broadcast nature of the wireless medium, wireless communication is susceptible to adversarial eavesdropping. This paper describes how eavesdropping can potentially be defeated by exploiting the superposition nature of the wireless medium. A Gaussian wire-tap channel with a helping interferer (WTC-HI) is considered in which a transmitter sends confidential messages to its intended receiver...
In this paper, we present the passive wireless sensor network based on the surface acoustic wave(SAW) resonators. The sensor node consists of the SAW sensor that is small, light, reliable, stable, sensitive, wireless and passive, so the battery is needless and its life-span is infinite. The sink node gathers data from the sensor nodes, processes the data with intelligent algorithms and transmits the...
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors prior to deployment. After deployment, each sensor tries finding a common key shared by itself and each of its neighbors to establish a link key to protect the wireless communication between themselves. One intrinsic disadvantage...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.