Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Due to limitations of power, computation capability and storage resources, wireless sensor networks are vulnerable to many attacks. The paper proposed a novel routing protocol algorithm for Wireless sensor network. The proposed routing protocol algorithm can adopt suitable routing technology for the nodes according to distance of nodes to the base station, density of nodes distribution and residual...
Nowadays, Wireless Sensor Network (WSN) is becoming a hot topic after the "Sensor China" concept proposed in 2009. Sensor nodes are deployed in a hostile or unattended environment to collect the data information. Therefore, network security has become a big problem. A new key management scheme of security network architecture for wireless sensor network is presented in this paper. The proposed...
In multihop wireless networks (MWNs), the mobile nodes usually act as routers to relay other nodes' packets to enable new applications and enhance network performance and deployment. However, selfish nodes may not cooperate and make use of the cooperative nodes to relay their packets, which has a negative effect on network fairness, security, and performance. Incentive systems implement micropayment...
With the advent of unbounded small-scale dust sensors being deployed in wireless sensor networks, existing authentication protocols for ordinary wireless sensor networks are becoming less efficient for dust sensors. Resource constrained dust nodes must do anything in cooperation with other nodes. Existing key management protocols require large key storage in each node, which cannot be stored in smart...
Wireless sensor networks are widely used both in the civil and military fields. Large-scale sensor nodes are usually deployed in potentially adverse or even hostile environment, so the security in these networks is very important. The design for key management protocol is one of the most important aspects and basic research field of secure wireless sensor networks. The key management in wireless sensor...
The survivability of the wireless sensor network (WSN) is threatened by resource limitations and security attacks. Security and survivability of WSNs are receiving increasing attention, particularly critical infrastructure protection. Our goal is to develop a framework for secure and survivable WSN that can provide essential services in the presence of attacks and failures, and recovery of full services...
An improved LU matrix key-distribution scheme for wireless sensor networks is proposed. Based on the LU matrix, the hash function and the clustered structure, this scheme can delete and update key information with the network topology changes to avoid key information to be revealed. Also, this scheme can reduce communication, computation and key storage overhead, which can solve the problem that each...
Resource-constraint nature of wireless sensor network (WSN) makes the security issue certainly a big challenge. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper we present a secured key management protocol (SecCOSEN) adopted on COSEN, a chain oriented sensor network, which is used for periodic data collection. SecCOSEN uses partial key pre-distribution...
Hierarchy-based wireless sensor networks (WSNs) achieve excellent performance with reserving energy consumption and decreasing system delay. However, distinguished hierarchy-based research such as LEACH (low-energy adaptive clustering hierarchy) does not consider a security issue for ensuring the protection of the network. Due to the peculiar character of LEACH such as round base operation and header...
Wireless sensor networks are widely applied in various applications. But due to the resource-constrained sensor nodes and the malicious attacks, the traditional key management schemes are not suitable for the network. Based on the particularities, many relevant key management schemes are developed for wireless sensor networks. This paper proposes an improved matrix key-distribution scheme for wireless...
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attacks by replicating the compromised node, distributing the clones throughout the network, and starting a variety of insider attacks. Previous works against clone attacks suffer from either a high communication/storage overhead...
Wireless sensor networks (WSN) have been identified as being useful in a variety of domains from the battlefield to environmental monitoring. We motivate the security problems that sensor networks face by developing a scenario representative of a circle-distributed 2-hops network model. Threats are identified to this model and a new lightweight security solution, comprised of the topology discovery...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.