The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Network has been applied in many areas successfully. Because it is often deployed in special areas or remote areas, the nodes are captured easily. Therefore, the security of WSN has become present research focus. Key management is the foundation and core of the WSN security. Aiming at the character that WSN has no incredible nodes, we propose a feasible key management scheme based...
Recently, Numerous dynamic key management schemes have been proposed for WSNs , and it has long-lived networks, more sustained security and survivability, such as SHELL and LCOK. But most of these schemes are greatly depend on some central nodes (gateways), if these nodes were compromised, there will be great threat to the whole networks security and survivability. In this paper, we proposed a Location-aware...
Recently, System-on-Chip (SoC) technology has been adopted to design smaller, lower-power and cheaper tamper-resistant sensor nodes. In these nodes, we find that there exists a lifetime-secure memory fraction which stores the anterior part of the application executable binary code, namely "fingerprint". We propose a key management protocol based on this secure finger- print-FKM. In this...
The lack of support for federation and sharing inhibits real-world deployment of wireless sensor networks (WSNs). In federated mode, multiple sensor networks belonging to separate administrative domains are used to achieve an applicationpsilas goal; in shared mode a single sensor or network provides its services to a range of applications. The lack of support for federation and sharing is particularly...
Modern wireless communication system based on wireless sensor network is strictly depends on medium access mechanism to improve its performance. CSMA is modifying here in its CSMA/CA format and trying to enhancing its performance same as CSMA/CD has for wired network. The aim of the paper is to inform how optimization of CSMA based sensor network is possible and how we can deploy it for monitoring...
As the networking technology greatly advanced in past decades, wireless sensor networks (WSN) have been widely deployed and utilized in various areas. Security issues on WSN devices thus draw much attention. In order to ensure the security of IEEE802.15.4 WSN and to fulfill the strict limitations of area and energy, we propose an efficient scheme for AES-CCM architecture. We implement AES-CCM by taking...
Recent advancements in wireless communication and microchip techniques have accelerated the development of wireless sensor networks (WSNs). Key management in WSNs is a critical and challenging problem because of the inner characteristics of sensor networks: deployment in hostile environments, limited resource and ad hoc nature. In this paper we investigate the constraints and special requirements...
Security in wireless ad hoc network (WAN) is very important issue. Due to dynamic topology and mobility of nodes, Wireless Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless networks. Nodes of Wireless Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing communication...
Wireless sensor networks are going to allow for ubiquitous health monitoring, improving users' well-being, the healthcare system, and helping to quickly react on emergency situations. Meeting the strict security needs of these ubiquitous medical applications is a big challenge, since safety and privacy of medical data has to be guaranteed all the way from the sensor nodes to the back-end services,...
In this paper, we propose a detection scheme for sinkhole attacks in wireless sensor networks. Sinkhole attack makes flowing packets to pass through attacker. As a consequence, Sinkhole attack can be extended to various kinds of attacks. We analyze sinkhole attack methods in the networks that use LQI based routing. We show the detection of sinkhole attack can be achieved by using a few detector nodes.
As the complexity of systems is rapidly growing, the designers are moving towards use system level design Languages (SLDL) such as SystemC and SpecC. In this paper we use SystemC and SpecC languages for modeling and simulation of wireless sensor networks (WSN). First we start on simple ECO model and add modular sections as increases as the complexity. In the next step, we add data encryption using...
Wireless sensor networks (WSN) are used in many spheres, such as industry, commerce and military. WSN is composed of hundreds of thousands of sensor nodes with limited energy, computation and storage capacities. Thus the data aggregation technique becomes important because it can help to improving bandwidth usage and energy utilization. But the unprotected aggregation schemes are vulnerable because...
The broadcast is the important communication mode. As a new data coding method, the linear network coding can improve the data throughput of the broadcast, decrease the energy consumption of the node and reduce the data delay. How to combine the linear network coding with the broadcast in WSN in security has become the hot issue. In the paper, we introduce two parts of our research. Firstly we present...
In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs). In the early days of sensor networks, public key cryptography was thought to be completely unfeasible considering its computational complexity and energy requirements. By this time, several works have proved that the lightweight versions of many well-known public key algorithms...
Biological systems exhibit remarkable adaptation and robustness in the face of widely changing environments. Currently speaking, we often imitate the properties of biological systems. Based on this thought, it also exists the analogous situation in the WSNs (wireless sensor networks). Survivability is the ability to provide essential services in the presence of attacks and failures, and recover full...
Looking at the future of the wireless sensor networks and the applications which are likely to be deployed on it, the security is now becoming an evident feature. Lot many security architectures are proposed, but looking to the energy and memory constraints, the implementation still demands good amount of research. The simpler way seems is, to detect the intruder as early as possible and take the...
Wireless sensor networks are rapidly emerging as an important area in ubiquitous computing industry. They are very tiny devices with limited energy, memory, transmission range, and computation power. So, wireless sensor networks are vulnerable to security attack such as sinkhole attack, wormhole attack, and simple power exhaustion attack. However, wireless sensor networks must be secured from obstructing...
Wireless sensor networks are networks consisting of nodes with sensors to monitor physical or environmental conditions. Since nodes in wireless sensor networks have limited transmission capabilities, packets are generally transmitted to the destination node through several immediate nodes. However, if a malicious node is present on a route through which packets are forwarded, attackers can deliver...
Time synchronization is an important issue in wireless sensor network (WSN). Many applications of wireless sensor networks need local clocks of sensor nodes to be synchronized, requiring various degrees of precision. Some strict resources limitations of WSN make traditional synchronization methods unsuitable for it. Hence there are many synchronization algorithms for sensor networks specially. The...
There are a large number of papers on security in ad hoc networks, only a few consider sensor networks. And those works on WSN mainly discuss the problem about key management. The main purposes of this work are to establish a trust on the neighbor relation in WSN and propose a solution of achieving the goal. Our solution includes a mechanism to establish a trusted relation between all neighboring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.