The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
'A wormhole attack'-where an attacker receives packets at one location in the network, tunnels and then replays them at another remote location in the network. The route request can be tunneled to the target area by the attacker through wormholes. Thus, the sensor nodes in the target area build the route through the attacker. Later, the attacker can tamper the data, messages, or selectively forward...
In 2006, Du, Xiao, Chen, and Wu proposed a routing protocol for sensor networks using cell relay. They claimed their protocol was secure since they used pairwise key establishment. However, an adversary can implement attacks without keys or with only one newly deployed compromised node. Therefore, in this paper, we point out the vulnerabilities of this protocol and propose an improved protocol.
Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that are immobile and have pre-defined communication patterns. We argue that node mobility is a realistic characteristic of sensor nodes that needs to be taken into consideration in future...
The development of sensor technology has led to applications ranging from academic to military. These tiny sensors are deployed in environments where security for data or hardware cannot be guaranteed. Unfortunately due to the resource constraints, traditional security schemes cannot be directly applied. In this paper, an efficient way of detecting an intrusion using ant colony is proposed. The architecture...
In network communication, Byzantine attacks, i.e., attacks in consequence of the packet dropping and cheating (modified packets), are usually difficult to guard against. Several multi-path packet routing schemes have been recently proposed to recover lost packets on account of the packet dropping (caused by path failures or attacks), but no effective solutions have been proposed to counter cheating...
We provide in this paper three algorithms that enable the sensor nodes of a wireless sensor network (WSN) to determine their location in presence of neighbor sensors that may lie about their position. Our algorithms minimize the number of trusted nodes required by regular nodes to complete their process of localization. The algorithms always work for a given number of neighbors provided that the number...
The following topics are dealt with: mobility and routing in access networks; service authentication; military communications; network security; wireless networks; modulation and coding; communication theory; air-interface scheduling; RF devices; optical communication and networking; ad hoc networks; microwave photonics; OFDM; air-interface resource management; MIMO techniques; sensor networks.
The following topics are dealt with: wireless multimedia; sensor networks; wireless security; MIMO systems; ad hoc networks and routing; wireless computing; localisation and tracking techniques; air interfaces; smart systems; OFDM; and context-aware computing.
This paper presents a new key predistribution scheme for sensor networks based on structured graphs. Structured graphs are advantageous in that they can be optimized to minimize the parameter of interest. We discuss various parameters affecting such a scheme.
The following topics are dealt with: local computer networks; peer-to-peer systems; mesh and optical networks; sensor networks; energy awareness; routing; performance analysis; security; link layer; IEEE 802.11 system; design optimization; and resource management.
One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of "intrusion" is not clear in these networks. In this paper we investigate in depth one of the most severe attacks against sensor networks, namely the sinkhole attack, and we emphasize on strategies that an attacker can follow to successfully launch...
Wireless sensor networks, applied for monitoring physical environments, have recently emerged as an important application of the ad hoc networks paradigm. Low processing power and wireless connectivity make such networks vulnerable to various types of attacks. The dense deployment of sensors along with the protocol deficiencies, make broadcast attacks feasible. The current solutions for these types...
To solve radically the contradiction between the severely limited resource and security for the application in privacy-vital environment in wireless sensor networks (WSNs), we propose a new routing protocol called ITSRP: an Intrusion-tolerant secure routing protocol. We securely and efficiently reconstruct the routing packet in which we design some fields to emphasize the security accounting to the...
The range of applications of wireless sensor networks is so wide that it tends to invade our every-day life. In the future, a sensor network will surveil our health, our home, the roads we follow, the office or the industry we work in, or even the aircrafts we use, in an attempt to enhance our safety. However, the wireless sensor networks themselves are prone to security attacks. The list of security...
Ad-hoc wireless sensor networks (AWSN) are quickly gaining popularity due to the fact that they are potentially low-cost solutions that can be used in a variety of application areas including emergency response, medical monitoring, homeland security and environmental monitoring. On the other hand, AWSN introduce severe node resource constraints due to their lack of data storage capabilities, power...
The following topics were dealt with: multiservice networks; Web services; peer-to-peer systems; routing; QoS support and management; service management; congestion and admission control; traffic characterization; ad hoc networks; sensor networks; and security
The following topics were dealt with: personal communications; indoor communications; mobile radio communications; MIMO communications; wireless MAN IEEE 802.16; QoS; radio resource management in beyond 3G systems; convergence of mobile and broadcast; UWB; cognitive networks; sensor networks; ad hoc networks; wireless cellular networks; interference avoidance; antennas; 4G systems; OFDM; MC-CDMA;...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.