The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Wireless Sensor Network (WSN) is a wireless network consisting of small sensor nodes. Sensors are used to monitor physical or environmental conditions. WSNs are particularly used in military and civilian applications. As WSNs are generally deployed in an unattended area, they are prone to various types of attacks. One of the harmful attacks is Sybil attack in which a node illegitimately claims multiple...
Now a days wireless sensors are attracting strong interest for different monitoring and controlling applications as they are integrated with the function of sensing, processing and wireless communication. The wireless sensor networks have been deployed for agricultural, industrial, remote monitoring and traffic management purposes. As energy shortage is a worldwide problem so that more attention has...
Wireless Sensor Network is one of the most advanced and emerging technologies of the upcoming world and is being used in GPS Tracking, medical fields, Defence Departments, homeland security etc. The topology of WSN works in a triangular pattern. The sensor nodes collects the information from the environment, and sends it to the sink node, the sink node further transfer the information to base station...
In wireless sensor networks it is becoming more and more important for sensor nodes to maintain anonymity while communicating data because of security reasons. Anonymous communication among sensor nodes is important, because sensor nodes want to conceal their identities either being a base station or being a source node. Anonymous communication in wireless sensor networks includes numerous important...
Event source anonymity is potentially an important aspect of secure wireless sensor networks (WSN). The existing schemes developed for wired networks do not work in WSNs due to the characteristics of radio transmission and limited resources. A recent article proposed several solutions for the strong global adversary model. The protocols depend on dummy messages and special proxy nodes that filter...
Self organization is an important phase of a wireless sensor network. Thousands of Sensors are deployed in a large geographical area randomly without considering the location factor. After deployment, sensors nodes are required to self organize themselves to form a network of their own. How well the network is formed determines the life of the whole network as well as the quality of data transmission...
Wireless transmission module PTR6000M based on nRF24L01 module constitutes the wireless network with multi-way data synchronization testing in the rugged electromagnetic environment of the armored vehicles characteristic parameter testing. This program is successfully used in real vehicle testing, providing a reliable information source for running armored vehicles monitoring, security and optimal...
Wireless sensor networks attract applications ranging from border security to commercial market, and demand efficient security solution par application requirements. This paper presents a password-based authenticated key agreement protocol that allows mutual authentication and secure data transmission between sensor network and user. The protocol is well-suited in the resource-constrained sensor nodes,...
Data aggregation is a fundamental building block in sensor networks for power-efficient data collecting, thereby it is important to protect it from attack. In this paper, we consider defending against attackers who intend to stealthily change the aggregation value and mislead the base station into accepting arbitrary false aggregation result. The main idea of our solution is independent aggregating...
In this paper, we present a simple, lightweight, but robust security protocol for resource-constrained communications. This protocol is based on the backward property of RC4 stream cipher and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operations. Furthermore, an RC4-based hash function for the generation of message authentication...
Sensor networks are expected to be used at anywhere in the near future and recently their security problems have been rising. Due to the limited computing power of senor nodes, it is impossible to use asymmetric cryptography approaches for the session key establishment or to apply advanced encryption method such as AES and DES for the data encryption. In this paper, therefore, we propose a key establishment...
This paper proposes a fast forward medium access control protocol (FFMAC) for quality-of-service (QoS) guarantee in multihop IEEE 802.11s wireless mesh networks with multiple channels. To the best of our knowledge, the proposed protocol is the first one which considers the multihop and multichannel issues simultaneously. It provides higher priority for real-time applications, while remaining the distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.