The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present the design of an energy-saving wireless sensor network using ZigBee standard with tree network topology and the frequency band of 2.4 GHz. By choosing low power consumption components, modifying the MAC algorithm and AES cryptography, the proposed network allows users to utilize the power efficiently, provide high level of security and can be applied to a variety of applications.
Wireless Sensor Networks (WSNs), deployed in distributed Internet of Things (IoT) applications, measure data, process, exchange information, and function collaboratively with other sensor nodes and end-users, which can be internal or external to the network. To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication...
Unattended Wireless Sensor Networks (UWSN) are usually deployed in human-hostile environments. Such architectures raise a challenge to data protection for two main reasons. First, sensors have limited capacities in terms of performance and memory, so not all cryptographic mechanisms can be applied. Moreover, the measurements cannot be immediately gathered, so they have to be kept inside the devices...
A reliable and efficient security system on the Internet of things era is one of the most required aspects. An information security in the environment monitoring system is very important, the information sent from the wireless sensor network to the Data Center must be completely secure and only users with the access right can read the contents of the information. To secure the contents of the data,...
Designing a group key management scheme for group communication in wireless sensor network is a challenging task given the limited energy, computational power and memory of the sensor nodes. A group key management scheme should satisfy backward secrecy and forward secrecy security requirements in case of sensor revocation and new sensor join respectively. All the existing schemes are analyzed for...
Group Key Management is for maintaining a consistent group key that facilitates group communication in a dynamic group of members using a broadcast channel. Most group key management schemes preserve forward and backward secrecy of the group key under passive attack models. However, the more practical attack model is the strong active outsider adversary model. In this type of attack, an attacker can...
6LoWPAN networks involving wireless sensors consist of resource starving miniature sensor nodes. Since secured authentication of these resource-constrained sensors is one of the important considerations during communication, use of asymmetric key distribution scheme may not be the perfect choice to achieve secure authentication. Recent research shows that Lucky Thirteen attack has compromised Datagram...
Railways constitute a main means of mass transportation, used by public, private, and military entities to traverse long distances every day. Railway control software must collect spatial information and effectively manage these systems. Wireless sensor networks (WSNs) are an attractive solution to cover the area along-side the railway routes. In-carriage WSNs are also studied in cases of dangerous...
The development of wireless sensor networks and constant increase of their capabilities enabled the integration of image capturing device within sensor node, representing the basis for visual sensor network. Such smart camera is primarily used for converting visual data into knowledge. The paper analyzes security requirements of visual sensor networks and describes possible security threats and attacks,...
We study the connectivity of a random graph formed by the intersection of an inhomogeneous random key graph with an inhomogeneous Erdős-Rényi graph. The former graph is naturally induced by a heterogeneous random key predistribution scheme introduced for securing wireless sensor network communications. In this scheme, nodes are divided into r classes according to a probability distribution μ = {μ1...
Named Data Networking (NDN) is a new type of data-centric future internet architecture, and introducing security mechanisms into the architecture directly. However, in the process of verifying and transmitting data packets, there are still some issues of the sensitive information leakage. Aiming at the above problems, this paper proposes a sensitive information protection scheme using attribute-based...
The increasing adoption of the Internet of Things introduces new threats that affect the privacy of users. Current privacy enhancing technologies are not sufficient to address all these new threats. This paper explains one of the most powerful protocols, namely DC-net. The DC-net protocol, while more than 30 years old, was never used in real-life due to its overhead and sensitivity with regards to...
We consider a wireless sensor network secured by a heterogeneous random key predistribution scheme and investigate its reliability against both link and node failures. The heterogeneous random key predistribution scheme is a lightweight security mechanism proposed to secure sensor networks that include nodes with varying levels of resources, features, or connectivity requirements; e.g., regular nodes...
In conventional wireless sensor networks (hereinafter referred to as WSNs), the single sink node model has been employed to collect and store the measured data that can be accessed by external users of WSNs. However, the single sink model of WSNs can be the single point of failure for some usage. To counter this problem, we can employ multiple gateway-based WSNs. In addition, WSNs are susceptible...
Key Pre-distribution in wireless sensor network refers to distributing secret keys in sensor nodes prior to deployment. Among a range of key pre-distribution schemes combinatorial design based come within reach of most suitable method due to its good expansion in the secure communication graph. Combinatorial based scheme distributes keys to the sensor nodes according to the Balance Incomplete Block...
These days Internet of Things (Internet of things) has transformed into a serious ponder that has made progress in the practically every field we can imagine. The following research paper gives a review of Internet of things, its empowering innovations, developing applications and security issues in the remote advancements. There are colossal number of uses of Internet of things in practically every...
Wireless sensor networks are designed to collect information related to some events in hostile environments where human presence is not often possible. That is why we consider that once they are deployed, the sensors are autonomous. Their lifetime tightly rely on the manner of their batteries are utilized during network operations. Then, the most critical feature in sensor networks is the hardship...
WBAN (Wireless Body Area Network) plays a fundamental role in telemedicine. However, due to the small size of sensor devices and weak capabilities in data processing/storage, WBAN is limited in application. In order to improve the ability of WBAN system and provide a richer service, the cloud-assisted WBAN has been proposed. Recently, He et al. proposed a method to check the data integrity in cloud-assisted...
A Wireless Sensor Network (WSN) is a group of specialized sensors with a communications infrastructure for monitoring and recording conditions at diverse locations. In WSN's to access the real time data from the sensor nodes a proper user authentication technique is required before allowing the users to access the data. In 2015 A.K. Das has proposed a user authentication technique with three factors...
Wireless Sensor Network (WSN) is an energy consumed network. Since most of the energy is consumed for transmitting and receiving data, the energy saving mechanisms plays a vital role in WSNs. One important mechanism to reduce energy consumption in the network is data aggregation. In-network data aggregation removes redundancy as well as unnecessary data forwarding, and hence cuts on the energy used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.