The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent advancements in micro-computing have provided an exponential increase in the capabilities of a wide range of devices and have allowed the implementation of complex mobile wireless sensor networks (mWSNs). Common battery-powered sensor nodes require security techniques that eliminate redundant processing overhead for resource conservation, without compromising the overall network performance...
The following topics are dealt with: autonomic event computing; user-provided networking; broadband single carrier; HeterWMN mobile networks; HeterWMN wireless sensor networks; femtocell networks; exploiting shared media; aerial channel analysis and physical data links; handover and network selection in future broadband networks; performance modelling; coding for memories; cognitive radio, VANET and...
The rapidly developing wireless communications and embedded micro-electro systems has made wireless sensor networks (WSN) possible for extensive applications. However, the security of the WSN becomes one of the major concerns in those applications. Elliptic curve cryptography (ECC) prominently provides solid potential for WSN security with its small key size and its high security strength. However,...
Security is one of the core challenges especially for ICT in disaster Recovery. Sensitive data is transmitted via insecure links. Furthermore, there may be competing interests. Thus, there is a high probability of disturbance or eavesdropping of communication. However, the hierarchical structure of networks in such scenarios can be exploited for security purposes. Based on this, we developed the Topology...
In this paper a new method is introduced to increase security in wireless sensor networks by using data-oriented random number generator to encrypt tag of frames. These tags are exclusive disjunction with output of data-oriented random number generator. Data-oriented is a new and applied theory which provides methods that models the concepts with data structures. This idea increases the security in...
Wireless sensor networks(WSNs) are widely used in many applications, however in some hostile scenarios WSNs are susceptible to many malicious attacks. Due to various source limitations and salient features of WSNs, the security design for such networks is significantly challenging. we propose a secure protocol to provide current network coverage information. In contrast to previous security mechanisms,...
The wireless data collected in mobile environments provides tremendous opportunities to build new applications in various domains such as Vehicular Ad Hoc Networks and mobile social networks. One of the biggest challenges is how to store these data. Storing the data decentralized in wireless devices is an attractive approach because of its major advantages over centralized ones. In this work, to facilitate...
In this paper, we suggest the idea of separately treating the connectivity and communication model of a Wireless Sensor Network (WSN). We then propose a novel connectivity model for a WSN using first order Reed-Muller Codes. While the model has a hierarchical structure, we have shown that it works equally well for a Distributed WSN. Though one can use any communication model, we prefer to use the...
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns of WSNs receiving closer attention of research community. Well known security threats in WSNs range from Denial-of-Service (DoS), Replay and Sybil attacks to those targeted at violating data integrity and confidentiality...
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some security issues; in particular, aggregator nodes become attractive targets of physical destruction and jamming attacks. In order to mitigate this problem, we propose a new private aggregator node election protocol that hides the...
Wireless sensors are low power devices with small transmission range, restricted computation power, limited amount of memory and with portable power supply. Wireless Sensor Network (WSN) is a collection of such sensors where the number of sensors can vary from few hundreds to thousands. Performing secure pair-wise communication between sensors is a really difficult task due to inherent characteristics...
As wide applications of wireless sensor networks, privacy concerns have emerged as the main obstacle to success. When wireless sensor networks are used to battlefield, the privacy about sink-locations become a crux issue. If sink location will be exposed to adversary, the consequence is inconceivable. In this paper, a scheme based on local flooding of source and greedy random-walk of sink is proposed...
In this paper we describe SpartanRPC, a secure middleware technology for wireless sensor network (WSN) applications supporting cooperation between distinct protection domains. The SpartanRPC system extends the nesC programming language to provide a link-layer remote procedure call (RPC) mechanism, along with an extension of nesC configuration wirings that allow specification of remote, dynamic endpoints...
A new generation of Wireless Sensor Network (WSN) communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message transmission making it possible to authenticate messages based on distance. In this paper we present a practical implementation of Distance Based Message Authentication (DBMA) for WSNs using Nanotron...
The Wireless Multimedia Sensor Networks (WMSNs) consist of nodes that are capable of sensing, computing, communication, actuation, and power components. Some of the applications of the Wireless Sensor Multimedia Networks include habitat monitoring, target tracking, environmental monitoring, and traffic management systems, these applications require effective communication of event features in the...
A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larger forwarding traffic burden and consume more energy than nodes further away from the sink. The whole lifetime of WSN is deteriorated because of such an uneven node power consumption patterns, leading to what is known as...
Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is a problem that has received a lot of attention in the context of ad hoc networks. However, due to hardware constraints of sensors along with multi-hop...
Due to the hostile environment and the limitations of the wireless sensor networks (WSN for short), a feasible and efficient key management scheme becomes one of the critical issues in WSN. Many protocols proposed before didn't pay much attention to the key protection and revocation issues. So, to address these problems, we put forward a new dynamically clustering key management scheme based on secret...
A new security and efficient key pre-distribution scheme for wireless sensor network was put forward based on node ID and one-way hash functions, which could achieves a higher level security with considerably low communication overhead compared with existing typical pre-distribution scheme. This scheme could distribute and update the share key by one-time local broadcasting based on the one-way and...
A wireless sensor network (WSN) is formed of low powered, battery driven electromechanical devices called sensor nodes which communicate with each other through the wireless medium. Secure data communication is a major concern for many sensor network applications. To ensure the confidentiality, it is necessary to establish a secure communication link among sensor nodes by means of cryptographic keys...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.