The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: communication network; communication service; cognitive radio; protocols; security; ad hoc network; mesh network; all optical network; cellular network; network coding; resource allocation; wireless sensor network; and network performance.
The security aspect of wireless sensor networks has taken the attention of numerous researchers in the past several years. It has recently been proven that public keys are now feasible in wireless sensor networks but still consume a lot of processing time and memory. In this paper we propose the use of public keys based on ECC to exchange symmetric keys that will be used to encrypt communications...
Sensor networks have the potential to allow users to “query the physical world” by querying the sensor nodes for an aggregate result. However, a concern with such aggregation is that a few corrupt nodes in the network may manipulate the results that the querier sees. There has been a substantial amount of work on providing integrity for sensor network computations. However to the best of our knowledge,...
Key management is an important area of research in Wireless Sensor Networks (WSN), because resource constraints make security protocols difficult to be implemented. Key predistribution, which involves preloading keys in sensor nodes, has been considered as the best solution when sensor nodes are battery powered and have to work unattended. We propose a deterministic key predistribution scheme in WSN,...
Due to limitations of power, computation capability and storage resources, wireless sensor networks are vulnerable to many attacks. The paper proposed a novel routing protocol algorithm for Wireless sensor network. The proposed routing protocol algorithm can adopt suitable routing technology for the nodes according to distance of nodes to the base station, density of nodes distribution and residual...
Intrusion detection plays an important role in the area of security in WSN. Detection of any type of intruder is essential in case of WSN. WSN consumes a lot of energy to detect an intruder. Therefore we derive an algorithm for energy efficient external and internal intrusion detection. We also analyse the probability of detecting the intruder for heterogeneous WSN. This paper considers single sensing...
Emerging cooperative MIMO communication is a promising technology in improving communication quality for wireless sensor networks. However, the security problems inherent to cooperative communications also arise. In this paper we investigate the situation where some of the cooperative nodes are compromised and try to corrupt the communications by sending garbled signals. To combat the compromised...
Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. In this paper, we present performance requirements architecture of upper and lower layers design for WSNs. Our goal is to develop a framework that provides parameter requirements that are crucial to applications in WSNs, which are vulnerable to physical...
Nowadays security plays the major role in the network. Growing size of such proprietary networks creates increased opportunity for successful attack. Supervisory control and data-acquisition (SCADA) networks are more secure and vulnerable to attach from both internal and external intruders. It is the mechanism which is used to provide continuous monitoring and authentication to the network. Authentication...
Body Area Networks (BANs) are only recently beginning to revolutionize e-healthcare by making monitoring of various patients accessible and convenient for physicians and patients. Past research in BANs has focused on biosensor design, signal processing, power efficiency, and wireless protocols. However, numerous challenges plague its development and implementation to this day. One of these is the...
Summary form only given. Information Assurance (IA) grew out of the field of computer network security. However, IA is a much broader term than network security and relates to the managing of the risks associated with the use, processing, storage, and transmission of information. The most basic model of IA relies on three properties: confidentiality, integrity, and availability, thus it is often referred...
Currently, when matter comes to engineer a communication system for a new WSN application with a unique set of dependability requirements, the developer should undergo a lengthy process of analysing the existing solutions in order to select appropriate functionality. In this article we argue that because of variety of wireless sensor network applications there is a clear need for a systematic approach...
Sensor networks offer the advantages of simple and low-resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which restrict the amount of data that may be exposed when a key is compromised. In this paper, we propose novel...
Wireless Sensor Network(WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory makes sensor networks infeasible to use conventional security...
Wireless sensor networks are composed of sensors with low computational and energy resources. Transmission of data is one of the most energy consuming operations in such networks. In-network data aggregation is a popular technique which is performed to reduce data transmissions. However, by aggregating multiple data into one, the security of them is no longer guaranteed. While concealed data aggregation...
The purpose of a wireless sensor network (WSN) is to provide the users with access to the information of interest from data gathered by spatially distributed sensors. Generally the users require only certain aggregate functions of this distributed data. Computation of this aggregate data under the end-to-end information flow paradigm by communicating all the relevant data to a central collector node...
Modeling and computing trust in distributed computing systems like ad-hoc networks is very much challenging. Particularly in Wireless Sensor Networks (WSNs), where the network is formed and self-organized by relying on the almost strangers for reliable and normal operation, it is important to compute the trustworthiness of individual nodes in distributed manner. In order to find the trustworthiness...
Wireless sensor networks (WSNs) have security vulnerabilities. Thus, they are exposed to diverse attacks. A selective forwarding attack is service denial attack. In this attack, an adversary stains nodes and uses compromised nodes to selectively drop important messages. The checkpoint based multi-hop acknowledgement scheme (CHEMAS) is proposed to detect selective forwarding attack. The checkpoint...
Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels. The unique characteristics of the underwater acoustic communication channel, and the differences between underwater sensor networks and their ground-based counterparts require the development of efficient...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.