The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the fast boom of security threats in wireless sensor networks (WSNs) sensitive applications, we propose a game-theoretic protection approach for sensor nodes in a clustered WSN based on a repeated game. The proposed game model is developed for detecting malicious sensor nodes that drop the high priority packets (HPPs) aiming at maximizing the high priority data trustworthiness (HPT). Simulation...
After wormhole attacks the routing mechanism of wireless sensor network (WSN) is damaged, then the hop count and distance between nodes cannot be well matched, so that the WSN becomes the anisotropic sensor network, resulting in security treats for WSN. Considering that wormhole attacks can cause the changing of node connectivity, through the theoretical analysis and derivation, the paper has proposed...
Wireless sensor networks (WSNs) which powered by batteries are widely used in military, healthcare, and scientific environments. One important challenge for setting WSN is the energy problem. Power management is one of efficient solutions for such problem and must be taken into account at all levels of the WSN. However, the power management may be out of action when the WSN suffers malicious attacks...
In this paper, we propose an Intrusion Detection System (IDS) against Sinkhole attack in wireless sensor networks with mobile sink. In the detection model, the network area is divided into a flat grid of cells, and we use the signature-based technique, which is represented by the detection rate of a cell, to distinguish between real and fake sink nodes. The proposed IDS considers two types of sink...
In the matter of detecting clone attacks, we bring in a novel solution called Single Stage Memory Random Walk with Network Division (SSRAND) to circumvent the problems of simple random walk as exploited by both RAND and RAWL protocols. SSRAND combines the single stage memory random walk with network division for clone detection and simulation results verify that it not only reduces the communication...
Secure communication in Wireless Sensor Networks (WSN) is usually based on symmetric cryptographic approaches, whose robustness relies on an efficient key management protocol. Most of the reported key management protocols follow either a centralized approach where a single node has the authority of distributing the global shared key, or a partially collaborative approach where key distribution is...
Wireless sensor networks (WSNs) are used in many applications to gather sensitive information which is then forwarded to an analysis center. Resource limitations have to be taken into account when designing a WSN infrastructure. Authentication in WSNs is critical, as they are often deployed unattended in hostile environments and must transmit information over unsecured mediums. However, the cost of...
WSN (Wireless Sensor Network) has a wide range of applications. As a result, security problems become increasingly important. We investigate the problem of minimising the failure rate of packet delivery in the presence of the modification attacks and the selective forwarding attacks in a static WSN with one base station without using expensive encryption/decryption algorithms. We propose a novel heuristic...
Advances in microelectronics and integrated circuits, system-on-chip design, wireless communication and intelligent low-power sensors have empowered the development of Wireless Body Area Network (WBAN). IEEE 802.15.6 standard, approved in 2012, targets at wireless body area network. The network simulator 2 (NS-2) is a popular and powerful simulation tool, which provides substantial support for simulation...
Wireless sensor networks (WSNs) are widely used due to they are easy and rapid deployed, low cost, low power, self-organized, cooperatively collect the environmental information and realize the integration of the physical world and communication network. It is the fact that due to open nature of the wireless medium an adversary can easily eavesdrop and replay or inject fabricated messages. Different...
Highlighting that connectivity and communication are two separate concepts in a Wireless Sensor Network (WSN), we propose a novel model for connectivity of a WSN using first order Reed Muller codes. For communication, we choose to work with a model that utilizes Partially Balance Incomplete Block Designs (PBIBD). Two suitable cryptosystems can now be applied for the two different models. As a result,...
As the applications of Wireless Sensor Networks proliferate, security issues raised in this uncontrolled, self-organised systems comprising a large number of nodes with very low processing, buffering and communication capabilities become mandatory as they need to cooperate with each other, even for routing data messages to the desired destination. A solution that has been widely pursued to detect...
In this paper, we propose a strongly resilient polynomial-based random key pre-distribution scheme for multiphase wireless sensor networks (RPoK): a private sub-key is not directly stored in each sensor node by applying the polynomial-based scheme to the RoK scheme. Such a polynomial is linearly transformed using forward and backward keys in order to achieve the forward and backward security of polynomials...
Privacy preservation is an important issue in today's context of extreme penetration of Internet and mobile technologies. It is more important in the case of Wireless Sensor Networks (WSNs) where collected data often requires in-network processing and collaborative computing. Researches in this area are mostly concentrated in applying data mining techniques to preserve the privacy content of the data...
Survivability represents an important property of an information system which must withstand devastating malicious attacks and system failures, as well as continuously provide essential services to users. In this paper, we qualitatively analyze a system's states under different levels of attacks with varying system recovery abilities. Then, we use Colored Petri Net tools to simulate and measure the...
Wireless Sensor Networks (WSN) represent a new dimension in the field of networking. In this paper, an improved Genetic Algorithm is applied to the design of high performance multi-path routing protocol of WSN at the first time. The Algorithm consists of two stages: single-parent evolution and population evolution. The initial population is formed in the stage of single-parent evolution by using gene...
Cluster-based routing protocol is currently a hot research in wireless sensor network. In this paper, we propose an improved method RECHS(Redundant and Energy-efficient Clusterhead Selection) for LEACH protocol to balance network load and to extend the network life. In order to selecting reasonable clusterheads, our scheme first selects initial clusterheads and initial redundant clusterheads. By comparing...
Deployment of wireless sensor networks in sensitive applications such as healthcare, defence, habitat monitoring and early bushfire detection requires a careful consideration. These networks are prone to security attacks due to their wireless and deployment nature. It is very likely that after deployment of the network, sensor nodes are left unattended which causes serious security concerns. Insecure...
Cluster based organization is widely used to achieve energy efficiency in Wireless Sensor Networks (WSN). In order to achieve confidentiality of the sensed data it is necessary to have secret key shared between a node and its cluster head. Key management is challenging as the cluster head changes in every round in cluster based organization. In this paper we are proposing and prototyping a scheme...
Sensor nodes located on the boundary of the covered area often cause difficulties in maintaining a wireless sensor network's lifespan. This study proposes a simple method to approximate boundaries in wireless sensor networks. The approach uses only connectivity information of a network while not requiring nodes localize themselves. The proposed method divides a network into clusters and forms partial...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.