The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The revolutionary network that totally changed how the humankind life, the Internet, is now evolving into the Internet of things; which is being achieved by fetching the network connectivity to legacy industrial or commercial devices, as well as everyday objects. This connectivity may be an Internet connection, where the Internet protocol and related technologies are in use. But, there are also many...
Wireless Sensors Networks (WSNs) have been gaining significant attention in both the industries and the academia in recent years. However, WSN are vulnerable to growing security threats and attacks which are inept for the current traditional security mechanisms to cope with or mitigate such security challenges. As a solution, Software Defined Network (SDN) has emerged and been merged with WSN to form...
In this article, we propose to use game theory to model our WSN network. In this setting, the goal of the compromised node is to keep disrupting the network while remaining alive. The game studied is a two-player quantitative infinite game on a finite graph, where each transition can change some energy levels and some reward. The goal of the compromised node is hence to maximize its reward while maintaining...
This paper focuses on the security issue in Cyber-Physical Systems. The sensor transmits the state estimation information to the remote controller via wireless networks. Due to the broadcast characteristics of wireless communication, the systems are vulnerable to the eavesdropping attacks and jamming attacks. In this paper, we study how to maximize the secure transmission rate between sensors and...
In past years, mobile ad hoc networks (MANETs) widespread use in many applications, including for some mission-critical applications, and has become one of the major concerns such as security MANETs. MANETs due to some unique characteristics, prevention methods are not alone enough to protect them need, Therefore, the detection is possible for an attacker to breach system security, such as the need...
With the advancement of mobile devices, a new paradigm called opportunistic sensor networks emerges which has a lot of applications, such as Military surveillance, disaster relief, search and rescue, vehicle tracking and much more. Opportunistic Sensor Network (OSN) has become one of the actively researched areas motivating researchers to come up with routing strategies and securing the routing with...
Wireless sensor network will become isolated in various associated segments because of the disappointment of some of its hubs, which is known as a “cut”. In this paper, authors acknowledge the issue of distinguishing cuts by the remaining hubs of a wireless sensor network. System proposes an estimation which grants every hub to identify at the time of accessibility to an extremely assigned hub has...
Node Security is very important because there are many kinds of node behavior coexisting in an unknown network. Most of node trust evaluation existing is based on energy element and communication element, which is not sufficient to describe behavior security of a node. This paper evaluates node trust value by the node behavior effect on network security. It presents behavior cognition parameters and...
Wireless sensor networks are made up of many inexpensive nodes geographically distributed over a certain area where the sensor node components include sensors, actuators, processing unit and storage, location tracking and power supply unit. These types of networks have large range of applications that include environmental pollution, vehicle and building safety etc. In sensor networks, the nodes are...
Routing protocols in mobile ad hoc and sensor networks discover usable multi-hop routes between source and destination nodes. However, some of the routes found and used may not be as reliable or trustable as expected. Thus, finding a trusted route is an important component for enhancing the security of communication. This paper presents a trust-based routing protocol for enhanced security of communication...
Wireless Sensor Networks (WSNs) have become prolific in the past few years as low cost and easily deployable means to collect environmental data. With the increased scope of applications of WSNs it is imperative to assure security of the network itself against attacks, as well as to assure privacy and integrity of the data that is being collected and transmitted through the network. The I-TRM (Integrated...
The aim of this project is to define Vampire attacks, a new class of resource consumption attacks that use distance vector routing protocols to permanently disable ad hoc wireless sensor networks by depleting nodes' battery power. A node is permanently disabled once its battery power is exhausted; let us briefly consider nodes that recharge their batteries in the field, using either continuous charging...
Wireless Sensor Network (WSN) is a collection of sensor nodes capable for sensing instantaneously. WSNs are widely deployed in hostile environment on ad-hoc basis. Routing protocols are used to discover a suitable route among sensor nodes and transfer sensed data from one node to another node. Several routing protocols are developed and configured according to their characteristics. Ad-hoc nature...
In the last couple of years Software Defined Network (SDN) have come into existence which empowers network operators with more flexibility to manage and program their network. This type of network solves the limitation of legacy networks. Data plane and control planes are separated from each other as a result data plane devices simple act as a packet forwarding device and leaving the decision making...
Routing protocols is one of the key technologies in Wireless Sensor Network (WSN). More and more studies focus on the connectivity and secure communication between nodes in WSN. In this paper, according to the network structure in WSN, we classify the routing protocols into three categories, namely Data-centric protocol, Geographic routing protocol and Hierarchical routing protocol. An overview of...
Wireless sensor networks (WSNs) is a key technology which is deployed under the assumption that participating sensors are cooperative in forwarding each other's packets. However, some nodes may behave selfishly by dropping other's packets or refusing to provide services in an attempt to maximize its throughput with minimum expense. In this paper, we present a novel detection scheme based on Dempster-Shafer...
The localization of passive targets has been widely investigated in the field of security applications. In such a context, the target is non-cooperative, i.e. transceiver-free and not actively associated to any monitoring system. These constraints make the detection and localization process challenging from the sensing technology viewpoint. Standard solutions adopt dedicated and complex sensors (e...
In the last decade Wireless Sensor Networks (WSNs) have been gaining recognition due to the fact that they provide inexpensive solutions for a diversity of sensitive applications. However, these networks are at high risk to many routing attacks due to the nature of their deployment as well as their device characteristics. They are usually deployed in a distributed manner, unattended for a long period...
Due to open network nature of wireless sensor networks make them highly vulnerable to a variety of security attacks and easy target for adversaries, which may capture these nodes, analyze and easily insert fake route information. Wireless sensor network is an emerging, cost effective and unsupervised solution for collecting this information from the physical world and sending this information back...
The Eschenauer-Gligor (EG) random key predistri-bution scheme has been widely recognized as a typical approach to secure communications in wireless sensor networks (WSNs). However, there is a lack of precise probability analysis on the reliable connectivity of WSNs under the EG scheme. To address this, we rigorously derive the asymptotically exact probability of k-connectivity in WSNs employing the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.