The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSN) consists of sensor nodes that are networked and are deployed in unattended areas where security is very important. Security is considered as one of the vital issues in the area of sensor networks. This work proposes an efficient scheme that deals with the availability of a mobile node and introduces a session time within which the secured secret key remains valid. The...
Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study presents...
The optimization of resources to be used for securing transmissions in wireless sensor networks while retaining communication quality of service is a challenging task. In this paper, we propose an energy-aware mechanism to determine the most efficient set of packets to be processed according with the resource consumed and the packets delivery requirements.
Sensor-medium access control (S-MAC) protocol is a well-known MAC protocols designed for wireless sensor networks (WSNs). In this paper, we examine security vulnerability in S-MAC and analyze the power consumed at each stage of S-MAC according to vulnerability of denial of service (DoS) attack. From our analytical results, it can be induced that there is a need for a power-efficient authentication...
The sensor networks is a network technique for the implementation of Ubiquitous computing environment. It is wireless network environment that consists of the many devices, called the sensor node, which have miniature computing device, small memory space and very limited battery power. Though sensor network provides various capabilities, it is unable to ensure the secure authentication between sensor...
Wireless sensor networks (WSNs) have been widely used in a wide variety of applications. Deploying WSNs in unattended environments can cause various security threats. In these scenarios, provisioning user authentication is a critical issue. In this paper, we propose improved robust user authentication scheme for WSNs, which is a variation of strong-password based solution. We have analyzed security...
Security is one of the most important research issues in wireless sensor network (WSN). A Machine Learning (ML) based anomaly detection scheme is proposed, where Bayesian classification algorithm is used to detect anomalous nodes. By the tool NS2, a small number of samples are given and learned, and intrusion detection rules are built, network attack traffic is generated and simulated. And based on...
Wireless sensor networks (WSN) have become increasingly one of the most promising and interesting areas over the past few years. But the character of constrained resources makes it vulnerable to Denial of Service (DoS) attacks, resulting in a large number of compromised nodes. Until now, it is unrealistic to prevent DoS attacks, but compromised nodes may be designed to self-recover to reduce the harm...
Many applications require the privacy of the sampled data while they travel from the source sensor nodes to data collecting device, say data sink. Providing an efficient data aggregation scheme with preserving data privacy is a challenging problem in the research of wireless sensor networks (WSNs). Although the secure data aggregation in WSNs has been well studied in the recent years, there exists...
The paper presents the results of an empirical study of the intrusion detection methods in wireless sensor networks (WSN). It intends to verify if networking of heterogeneous sensors in WSN improves the system reliability and security. Unlike many other reported approaches, which employ conventional networking intrusion detection techniques in a WSN environment, this paper presents methods specific...
As the first step of the key management, identity authentication directly affects the security of WSN. However because of the limited-resources of WSN, traditional authentication protocol can't directly apply in WSN. To adapt to needs of it, we propose an ID-based identity authentication protocol based on ECDSA. ECDSA (elliptic curve digital signature algorithm) is the application of ECC in the signature...
The cluster-based routing of wireless sensor networks (WSNs) requires secure, robust protocols for wireless communication. Unfortunately, existing protocols are unsuitable due to the limited storage space of nodes. Although symmetric-key-based solutions have been available, all of them suffer from possible severe attacks, and the problem of limited storage space. These issues are truly critical in...
Nowadays, with the ever-increasing use of the wireless sensor networks (WSNs) in parallel with developments in sensor and wireless communication technologies, modeling of these networks has also become essential. The analytical modeling is one of the basic approaches used for testing WSNs and verification of their abilities. The goal of this study is to build an analytical model for the performance...
RFID system is used widely in different applications and comes in a myriad of forms today. It is doomed to be concerned by people and still be the hot spot of research in the next few years. In this paper, key issues of RFID reader network system are studied, such as taxonomy of RFID system, collision problems, security and privacy problems, etc. In the fifth section, integration of RFID and WSN (wireless...
Identity cryptography is widely used in security authentication. This paper proposes a standard identity-based authentication scheme, and also proves the security of the scheme under passive attack. On the basis of ECC and bilinear maps, paper implements the authentication protocol in the platform of TinyOs. Finally, paper analyzes its result and proves its feasibility.
A new key management protocol for wireless sensor network was put forward based on one-way key chain, which could afford deterministic security and could reduce the storage cost compared with existing typical pre-distribution protocols. This protocol could distribute, evict and renew the cluster-key by one-time local broadcasting based on the difficulty of factorization of polynomial, and resolve...
Secure communication of the location information or localization of sensor nodes in an adversarial environment is a high priority yet a challenging task. Wireless sensor networks are characterized by severe constraints such as memory, energy, processing and operational environment. Unlike other wireless networks, a sensor network has to be highly sensitive to energy consumption. Complexity and power...
In wireless sensor networks, sensor nodes eventually die due to battery depletion. Wireless sensor networks (WSNs) in which new nodes are periodically redeployed with certain intervals, called generations, to replace the dead nodes are called multi-phase wireless sensor networks. In the literature, there are several key predistribution schemes proposed for secure operation of WSNs. However, these...
Current secure authentication scheme is typically assumed to be the same communication ranges of all nodes in WSN. Howerver, due to the influence of environment and dynamic topology, the communication radius of all nodes are no strictly consistent, which may cause different neighbor number and redundant neighbors for one central node. As a result, energy consumption of each node is unbalanced and...
Deployment of wireless sensor nodes as a result of extensive, easily captured by the enemy, resulting in the leakage of key. In order to ensure the secure communications of wireless sensor networks, this paper advances a scheme, which repuires each node update the original key at given intervals, and discards the original key. In this way, even if the enemy captures the sensor nodes, they could only...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.