The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Communication privacy techniques that protect the locations of source sensor nodes and sink nodes have received significant attention recently. Several communication protocols that improve the capture time, which is the time it takes for an adversary to identify the location of the source, have been proposed and their effectiveness is analyzed using simulation models. A simple anonymous communication...
Event source anonymity is potentially an important aspect of secure wireless sensor networks (WSN). The existing schemes developed for wired networks do not work in WSNs due to the characteristics of radio transmission and limited resources. A recent article proposed several solutions for the strong global adversary model. The protocols depend on dummy messages and special proxy nodes that filter...
Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. When wireless sensor networks are deployed in a hostile terrain, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the inherent resource limitations of sensor nodes, existing...
Wireless sensor networks are often deployed in harsh environments, where the adversary is able to capture certain sensors. Once a sensor is compromised, the adversary can easily replicate it and deploy several replicas back into the network for further malicious activities. Although a number of protocols have been proposed to tackle such node replication attacks, few of these schemes are suitable...
Wireless sensor networks are specific adhoc networks. They are characterized by their limited computing power and energy constraints. This paper proposes a study of security in this kind of network. We show what are the specificities and vulnerabilities of wireless sensor networks. We present a list of attacks, which can be found in these particular networks, and how they use their vulnerabilities...
Achieving key agreement in wireless sensor networks (WSN) is a very hard problem. Many key agreement schemes come with a shortage of considering sensor addition, revocation, and also rekeying. This paper proposes a key distribution protocol based on the public key cryptography, RSA, and DHECC. The proposed protocol does not trust individual sensors, and partially trust the Gateway. Our protocol establishes...
Wireless sensor networks are used in many applications in military, ecological, health, and other areas. These applications often include the monitoring of sensitive information making the security issue one of the most important aspects to consider in this field. However, most of protocols optimize for the limited capabilities of sensor nodes and the application specific nature of the networks, but...
Wireless sensor networks (WSNs) have the potential to be widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized interception and detection. Privacy is becoming one of the major issues that jeopardize the successful deployment of wireless sensor networks. While confidentiality of the message...
Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that are immobile and have pre-defined communication patterns. We argue that node mobility is a realistic characteristic of sensor nodes that needs to be taken into consideration in future...
In timing analysis attackers study the transmission pattern of different nodes in a network with the goal of extracting information about users, applications, or the structure of the network, even when the traffic is encrypted. Defeating timing analysis attacks requires expensive traffic mixing measures that equalize the transmission pattern at all nodes; such measures are especially expensive for...
Node clone attack, that is, the attempt by an adversary to add one or more nodes to the network by cloning captured nodes, imposes a severe threat to wireless sensor networks. Several distributed detection protocols have been proposed against this attack. However, all of them rely on too strong assumptions and cannot be efficiently applied to most of sensor networks. In this paper, we propose an innovative...
Wireless sensor networks (WSN) have the potential to be widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized interception and detection. Privacy is becoming one of the major issues that jeopardize the successful deployment of wireless sensor networks. While confidentiality of the message...
Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field. However, general sensor nodes are manufactured with inexpensive components, and they are short of security enhancement. Therefore, an adversary could capture and compromise sensor nodes easily, then launch some malicious attacks (including tampering or discarding useful data collected from source nodes)...
The field of wireless sensor network (WSN) is an important and challenging research area today. Advancements in sensor networks enable a wide range of environmental monitoring and object tracking applications. Secure routing in sensor networks is a difficult problem due to the resources limitations in WSN. Moreover, multihop routing in WSN is affected by new nodes constantly entering/leaving the system...
Security plays a pivotal role in most applications of wireless sensor networks. It is common to find inadequately secure networks confined only to controlled environments. The issue of security in wireless sensor networks is a hot research topic for over a decade. This paper presents a compact generalized neuron (GN) based medium access protocol that renders a CSMA/CD network secure against denial-of-service...
In this paper, we present a provably secure routing protocol for wireless sensor networks, called S-SPIN (Secure-SPIN), that is a security extension of SPIN. The MAC scheme is introduced to guarantee the correctness and integrity of the messages. And we prove that under the formal security framework proposed by Acs et al, by using a mathematically rigorous proof technique, S-SPIN is secure if the...
An evolution of a hardware technology makes it possible to deploy lightweight and multi-functional mobile devices in a real environment. Wireless sensor networks (WSN) are representative networks using these tiny and low-power sensor devices. Two types of communications occur in sensor networks: one is between end nodes, and the other is between end node and base station (BS). Since not only the resource-restriction...
In this work, we addressed the need for cross-layer optimizations in wireless security. We proposed a cross-layer security framework with interactions across layer boundaries (vertical optimization) as well as node boundaries (horizontal optimization). We modeled different attacks at the network layer and application layer to illustrate the detection performance of the XLSEC framework. Preliminary...
The traditional security solution based on cryptography and authentication is not sufficient for wireless sensor networks, which encounters new challenges from internal attackers, and trust is recognized as a novel approach to defend against such attacks. In this paper, we propose a trust-based LEACH (low energy adaptive clustering hierarchy) protocol to provide secure routing, while preserving the...
Routing is an important issue in any type of networks. Multiple-hop based routing in sensor networks suffer performance downgrade from too many hops with the increase of the size of sensor nodes, as well as various attacks. A number of approaches have been proposed for routing in sensor networks, but they lack of sufficient support for secure routing in large-scale sensor networks. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.