The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of the network technology and the wireless communication technology, ZigBee now has an increasing wide application, which is an kind of emerging technology in the field of wireless sensor network. So the security of ZigBee is becoming more and more significant. In this paper, ZigBee security architecture, security services, security model, security components, security keys...
Wireless Sensor Network (WSN) is a high and new innovation comprises of spatially distributed autonomous sensors. These sensors are used to monitor physical or natural conditions over a far reaching territories. The Individual sensor is in charge of detecting the required sort of information and offers that information to the approved users. This WSN is also used by the military for several number...
Data aggregation is a widely used technique in wireless sensor networks to reduce the power consumed in WSN. In a bid to reduce the power consumption during data gathering, cluster heads are elected to gather data from every node in the WSN. There are various challenges that are involved in the process of data aggregation like checking of duplication of data after encryption, overhead due to encryption...
In this paper, we propose an authenticated data transmission technique for Clustered wireless sensor network (CWSN). The proposed scheme starts by assigning the identity, shared secret key and an encryption key to the sensor nodes by the base station (BS). Driven by the technology advances in micro-electronics, it is possible to run some key management techniques at each sensor level. This step helps...
Key management is one of the key security technology in wireless sensor networks. Key management in wireless sensor networks due to the arrangement of the position, limited the calculation, limited storage capacity, making the design faces many challenges, so the scheme propose a key-management scheme based on identity and cluster layer in wireless sensor network. The scheme use Identity authentication...
Security is one of the most important issues in all the fields, wireless sensor networks is not an exception to this. Security in sensor networks can be achieved by data confidentiality, authentication, freshness, and integrity. One of the main mechanisms used for this purpose is encryption and decryption but due to resource constraints of the sensor nodes these mechanism may affect their performance...
In a wireless network, when the adversary is being part of the network, they are well known about the protocol being used and other network secrets. A transceiver is enough to get the key and decrypt the message. Hence, simple cryptographic mechanism is not enough to protect the message. Moreover, jamming can be easily performed by modifying the packet header. Hence we have to go for advanced mechanism...
The most important requirements of Wireless Sensor Network (WSN) security are confidentiality, authentication and integrity. User authentication is necessary for legitimate access control in WSNs. These sensors have limited processing power, bandwidth, memory and limited communication abilities. Assume that WSN is deployed in a hospital, a university campus, or a smart home, to permit legal users...
Symmetric encryption of data using time-varying keys at base-station is proposed as an attractive and interesting method for broadcasting in wireless sensor networks since last time. In this paper, we have proposed a light-weight encryption scheme using time-varying at cost of delayed-verification. Main idea of the proposed model is that instead of using one key per each packet, we use one key per...
The challenges thrown by wireless sensor networks (WSNs) are unique given their delicate architecture and scant resources. Even though security for wireless networks has been a widely researched area for many decades, security for WSNs is still a major roadblock for their efficiency and performance. This is due to the tussle of how much resources can be expended for security in proportion to the sensor...
Although wireless sensor network is considered as one of promising technologies for ubiquitous computing environment, more researches for re-authentication of mobile nodes in wireless sensor network are required due to user mobility, one of important properties in ubiquitous computing environment. As the citizens in a city can be mobile user in wireless sensor network and the resource of the sensor...
Wireless sensor networks are often deployed in hostile and unattended environments. Then two important problems for key management are presented. First, how to establish the encryption keys among sensor nodes to ensure the security of the network applications. Second, how to avoid the key being obtained especially the sensor be captured. In this paper, we proposed a novel key management method based...
To achieve security in wireless sensor networks (WSNs), pairwise key establishment between two sensor nodes is important. Public key cryptography based key establishment mechanisms are not suitable for WSN, due to their more energy consumption and complex hardware requirements. On the other hand, a different class of key establishment scheme that stores key or key related information are computationally...
A sink node must be aware of the identifications (node IDs) of those all sensor nodes which contribute in aggregated value of sensors data in order to derive exact result of them in privacy preserving data aggregation scheme for wireless sensor networks (WSNs). This is possible only when if there exists such a scheme which can transmit IDs of all the participating sensor nodes to the sink node. But,...
The characteristics of Wireless Sensor Network (WSN) determine that the traditional security authentication mechanism can not meet its security requirements. Starting from the analysis on existing WSN security authentication solution scheme and combing with the widely used hierarchy distributed WSN architecture, the paper referred to the idea of security authentication of PKI with digital certificate...
Wireless sensor networks (WSNs) continue to evolve as one of the most exciting and challenging research areas. There are many applications of wireless sensor networks that collect and disseminate sensitive and important information. For successful operation of many of the sensor node applications, it is necessary to maintain the privacy and security of the data stored in the sensor nodes and of the...
Wireless sensor network has been widely used and its real-time data processing capability is very limited. This paper puts forward a new solution, which is the novel wireless sensor network node design with hyperchaos encryption based on FPGA. With the wide application on wireless sensor network based on ZigBee protocol, we encrypt the transported data in the network using hyperchaos by FPGA, which...
Freshness is one of the most desired security properties of sensor network communication architecture. And sequence number is a common technique that is used as a freshness identifier to achieve freshness transmission. However, due to characteristics of wireless sensor network, such as resource-constrained and attack prone, it is vulnerable and energy-expensive to transmit sequence number directly...
This paper proposes an encryption scheme based on key pre-distribution for wireless sensor network (WSN), which fulfills perfectly all the security requirements in WSN using the counter and message authentication code during the encryption process. Furthermore, the related protocols or algorithms are very simple and no expensive public-key operation is required in view of resource-starved sensor nodes,...
The inexpensive tiny wireless sensor can be embedded in devices to enable any commercial application, but are prone to intruder attacks. Due to the limited resource constraint in wireless sensor network, security in protocols is sacrificed or kept minimal. The distributive and self-organizing nature of sensor based on environment requires protocol to be adaptive, energy efficient and secure. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.