The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Research into the security of the Internet of things is increasingly attracting the attention of the scientific community. This study examines three key security requirements, with an emphasis on Internet systems of things: authentication, privacy and access control. Attention is focused on security issues that have not been resolved to date, and also addresses the problems and future trends in the...
Wireless Sensor Networks present several advantages when compared to wired ones, among them, the low consumption and simplicity of installation. In some cases, energy consumption may be so low as to allow the use of energy harvesting techniques, as in the case of EnOcean protocol. In other networks, it is necessary to meet specific requirements, such as in industrial ones, where communication must...
Innovations in technology that have enabled efficient wireless tiny devices propelled the concept of Internet of Things. It is expected that mobile data traffic will experience 8-fold growth between 2015 and 2020 and the number of mobile connected devices will reach 11.6 billion by 2020. Main factors of this exponential growth and wide acceptance are the integration of several technologies and communications...
The revolutionary network that totally changed how the humankind life, the Internet, is now evolving into the Internet of things; which is being achieved by fetching the network connectivity to legacy industrial or commercial devices, as well as everyday objects. This connectivity may be an Internet connection, where the Internet protocol and related technologies are in use. But, there are also many...
Physical layer security is becoming a promising technology to face the security challenges of diversified and rapidly-growing wireless applications. In this paper, we propose a three-hop secure Orthogonal Frequency Division Multiplexing (OFDM) transmission protocol for the wireless networks with untrusted relays. In the proposed protocol, instead of exploiting the degree of freedom over spatial domain...
The IoT is a technology that enables the inter-connection of smart physical and virtual objects and provides advanced services. Objects or things are generally constrained devices which are limited by their energy, computing and storage capacity. A Wireless Sensor Networks (WSN) is a network composed of devices managed by a CPAN (Personal Area Network Coordinator). The network is used in order to...
Future automated vehicles will rely on V2V communication to exchange information about their motion states and take corresponding control actions, to enhance road safety and efficiency. Evaluating the trustworthiness of such data in a VANET is critical as malicious vehicles may inject false data which will undermine the benefits of V2V communication and lead to severe consequences, such as collisions...
Software Defined Networking (SDN) is a developing networking paradigm that advocates a complete overhaul of the conventional networking. SDN decouples the control logic from the data forwarding functionality; which traditionally are coupled on the network device. The coupling stifles innovation and evolution because the network often becomes rigid. Software Defined Wireless Sensor Networks (SDWSN)...
Software-Defined Wireless Sensor Networking (SDWSN) is an emerging paradigm that seeks to alleviate the inherent resource constraint issues present in Wireless Sensor Networks (WSN) by adopting a Software-Defined Networking (SDN) approach to the management of WSN. This SDWSN paradigm is said to play a crucial role in both the developing Internet of Things (IoT) paradigm and the development of smart...
Software Defined Wireless Sensor Network (SDWSN) is realised by infusing Software Defined Network (SDN) model in Wireless Sensor Network (WSN), Reason for that is to overcome the challenges of WSN. Artificial Intelligence (AI) and machine learning play an important role in our society, give rise to systems that can manage themselves. WSNs have been used in various industrial applications, where reliability...
In recent decades, the significant expansion and popularity of wireless sensor networks in various applications have attracted the attention of many researchers. Energy and security restrictions are main challenges for the researchers. The application of these networks in inaccessible and dangerous environments and wireless communications between nodes have led them to be subjected to direct attacks;...
In this paper, an online working condition monitoring system is designed to early warn environmental quality in manufacturing industry. It is very crucial to provide real time and accurate data for staffs, stakeholders and control center to monitor factory air quality at working place. By uploading the all collected data on internet, the environmental condition can be monitored in real time by users...
In all the security issues in wireless sensor networks (WSNs), session key exchange is fundamental one with a great challenge. Owning to the semi-group property and one-way trapped characteristic of Chebyshev polynomials, an enhanced key exchange scheme based on Chebyshev chaotic map for WSNs was proposed in this paper. Our scheme aims at increasing the security of the session key between nodes. According...
Wireless Sensor Networks (WSNs), deployed in distributed Internet of Things (IoT) applications, measure data, process, exchange information, and function collaboratively with other sensor nodes and end-users, which can be internal or external to the network. To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication...
In a Wireless Sensor Network (WSN), there are a large number of nodes whose power supply and computational capability are limited. The nodes in a wireless sensor network can be fixed or move randomly. Thus in these networks, to forward a data packet from one node to another needs to use specific strategies with very different characteristics. Accordingly the data forwarding strategy among nodes plays...
The rapid growth of WLAN over past few years has increased immensely in academia as well as in every industry, but many weaknesses are there in ad hoc network, due to this many attackers are really passionate towards authorization. For the authentication defense mechanism and wireless monitoring has become a vital component of computer security to predict and prevent attacks. In this paper, we explain...
This work presents a novel scheme which reinforces strength of encryption keys in low-power and low-rate wireless sensor networks (WSNs). The proposed algorithm utilizes pseudo-random features of physical layer (PHY) of the communication stack to enable time-evolution of network keys increasing their complexity and reliability. This scalable and light-weight scheme is suitable for large networks of...
During the last few years critical advancements in Wireless Sensor Networks (WSNs) have highlighted respective platforms as a prominent technology able to tackle various challenges posed by Smart-City application scenarios. Through their communication paradigm and platform versatility WSNs are able to meet increasingly demanding communication requirements. However, a critical area that has not been...
Over the last years, the number of rather simple interconnected devices in nonindustrial scenarios (e.g., for home automation) has steadily increased. For ease of use, the overall system security is often neglected. Before the Internet of Things (IoT) reaches the same distribution rate and impact in industrial applications, where security is crucial for success, solutions that combine usability, scalability,...
Wireless Sensors Networks (WSNs) have been gaining significant attention in both the industries and the academia in recent years. However, WSN are vulnerable to growing security threats and attacks which are inept for the current traditional security mechanisms to cope with or mitigate such security challenges. As a solution, Software Defined Network (SDN) has emerged and been merged with WSN to form...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.