The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data sensed and transferred between sensor nodes should be secure and preserve battery life. Some algorithms, such as LEACH (Low Energy Adaptive Clustering Hierarchy), have been proposed to efficiently organize sensor nodes into clusters, where a cluster-head, is elected to represent that cluster. To save energy, the cluster-head coordinates the cluster and forwards data generated within the cluster...
A wireless sensor network is a network of small computers, sensor nodes, that can gather information via its sensors, do computations and communicate wirelessly with other sensor nodes. In general a wireless sensor network is an ad hoc network in which the nodes organize themselves without any preexisting infrastructure. Once in the area, the nodes that survived the deployment procedure communicate...
With the fast development of wireless sensor network (WSN) and the Internet of things (IOT), as the key technologies of both of them, the security of nodes of networks is becoming more and more important. Compared with other protocols, hierarchical topology has advantages in energy saving and network control, but almost none of existing hierarchical protocols has been considered about the security...
In this paper, we propose a cluster-based group key management scheme for wireless sensor networks(WSNs) that targets at reduce the communication overhead and storage cost of sensor nodes. In the proposed scheme, a group key is generated by the collaboration of cluster head and nodes within the cluster. Only cluster heads take responsible for reconstruct and delivery the group key. Performance evaluations...
Self organization is an important phase of a wireless sensor network. Thousands of Sensors are deployed in a large geographical area randomly without considering the location factor. After deployment, sensors nodes are required to self organize themselves to form a network of their own. How well the network is formed determines the life of the whole network as well as the quality of data transmission...
Wireless sensor networks (WSN) are ad-hoc mobile networks in which the sensors have limited resources and communication capabilities. Secure communications in some wireless sensor networks are critical. Recently, several secure schemes for wireless sensor networks have been proposed. Localized combinatorial keying (LOCK) proposed by Mohamed Eltoweissy is secure wireless sensor network scheme based...
Wireless sensor networks (WSN) are practical implementations of distributed computing ad-hoc wireless networks. Typically empowered with scarce energy resources and limited computing power, they are mainly used for in situ data acquisition and monitoring of the deployment area. As such, they are susceptible to various forms of jamming, at the physical and data link layer. Of special interest are the...
Cluster formation of nodes in wireless sensor network is an effective approach and key technology to implement energy saving and flexible management. To improve security and efficiency of clustering network, a secure clustering model was proposed to identify and get rid of malicious nodes, to achieve cluster-range self-management and on-demand cluster maintenance based on the random and parallel cluster...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.