The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSNs) often are deployed in harsh environment where reliable communication may not be feasible. This work proposes data-driven data transmission mechanism to improve packet delivery frequency especially in harsh communication environments. In particular, this work evaluates the effect of adjusting data transmission frequency based on data priority, to provide sufficient data...
In order to solve the problems in wireless sensor networks, such as node failure and losing of master key, a secure communication model based on secret sharing in wireless sensor networks is presented in this paper. In this model, with the secret sharing mechanism, the master key is divided into n parts which are distributed to the council nodes. Accordingly the council nodes can protect the master...
Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. When wireless sensor networks are deployed in a hostile terrain, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the inherent resource limitations of sensor nodes, existing...
Key management poses a main concern for security operation in wireless sensor networks. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors in homogeneous sensor networks. In recent, some research has demonstrated that heterogeneous sensor networks can achieve better performance in security than homogeneous networks. In this paper we propose a key- chain...
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned node detection and revocation of compromised nodes. By combining probabilistic analysis of logical key graphs and linear control theory, we derive a dynamical model that efficiently describes network behavior under attack...
Wireless sensor networks (WSNs) are often deployed in unattended and hostile environments. In order to protect the sensitive data and securing communication, secret keys should be used to encrypt the exchanged messages between communicating nodes. In this paper, we propose a self-organizing key management scheme based on trust model and Bilinear Pairing, called Behavior Trust-Based Keying (BTBK)....
Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion...
Abstract-In a sybil attack, the adversary compromises nodes in the network and assigns them multiple fake identities, commonly referred to as sybil identities. Sybil node attacks can be crippling for a wireless sensor network, which operates under the 'majority is right' assumption. As the sybil nodes behave as normal nodes they are hard to identify. With the nodes in the network being able to regulate...
Two Phase geographic Greedy Forwarding (TPGF) is a pure on-demand geographic greedy forwarding protocol for wireless multimedia sensor networks (WMSNs). Unlike position-based routing protocols, TPGF has explicit route discovery, i.e., a node greedily forwards a routing packet to the neighbor that is the closest one to the destination to build a route. Thus, TPGF is vulnerable to some greedy forwarding...
We present an efficient key distribution scheme for sensor networks in which resource constraints and the possibility of node capture and malfunctions are considered. We deal with the problem of efficient routing and key distribution simultaneously. The resulting scheme is scalable and resilient to node captures and malfunctions. Under certain assumptions, the scheme has an upper bound of log2N on...
The node capture attack on wireless sensor networks (WSNs) can be broken into three stages: node capture, node redeployment, and insider attacks. Existing detection techniques of the attack are mostly implemented in the second stage. Recent discovery proved the feasibility of quick and effective detection in the first stage. We propose a hello message based first stage detection scheme, which is faster,...
Broadcasting is an important method of communication in wireless sensor network, the reliability and security of broadcast should be satisfied. Also, due to the limited resources of sensors, reducing the energy consumption is a major consideration. In this paper, we proposed an efficient and reliable broadcast protocol for clustered WSN (ERBP). In ERBP, nodes need its 1-hop neighborhood information...
The following topics are dealt with: intelligent sensor; wireless sensor networks; sensor fusion; sensor network security; and sensor network for health care.
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. Although...
In this paper, we deal with the problem of distributed data fusion in unsafe large-scale sensor networks. Data fusion application is the phase of processing the collected data by sensor nodes before sending it the end user. During this phase, resource failures are more likely to occur and can have an adverse effect on the application. Hence, we introduce first an efficient self-stabilizing algorithm...
Security is an important issue for sensor networks deployed in hostile environments, such as military battlefields. The low cost requirement precludes the use of tamper resistant hardware on tiny sensor nodes. Hence, sensor nodes deployed in open areas can be compromised and used to carry out various attacks on the network. In this paper, we consider the collision attack that can be easily launched...
A Routing Algorithm base on Trustworthy Core Tree for WSN (RATCT) is proposed in this paper aims to prolong network lifetime as well as increase network security in a hierarchical-cluster sensor network. Cluster heads with higher residual energy and trust level are elected from underlying sensor nodes. A minimum energy consumption spanning tree algorithm is used to organize all cluster heads into...
The main goal of Cluster-based sensor networks is to decrease system delay and reduce energy consumption. LEACH is a cluster-based protocol for micro sensor networks which achieves energy-efficient, scalable routing and fair media access for sensor nodes. However, the election of a malicious or compromised sensor node as the cluster head is one the most significant breaches in cluster-based wireless...
In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we consider consists of a collection of sensor nodes, cluster heads and a base station arranged hierarchically. The framework encompasses schemes for establishing and managing trust between these different entities. We demonstrate that the proposed...
Information theoretic security attracts researchers for its robust nature and multiple input multiple output (MIMO) channel in the presence of multiple eavesdropper offers an unveiled research area. In this paper, a Gaussian multiple input multiple output multiple eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. We present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.