The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sensor network is one of the authoritative leading technology of current century. Security is the main concern for everything whether it is for wired based networks or wireless based networks. So far, many of the researches have thought to physically implement the sensor nodes and sensor networks for secure communications but they did not think over it for security perspective. Sensor network works...
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on...
Key management is an important area of research in Wireless Sensor Networks (WSN), because resource constraints make security protocols difficult to be implemented. Key predistribution, which involves preloading keys in sensor nodes, has been considered as the best solution when sensor nodes are battery powered and have to work unattended. We propose a deterministic key predistribution scheme in WSN,...
Providing confidentiality, integrity, and availability is indispensable for secure systems. In particular, almost every commerce application requires that integrity be provided in a secure manner, such that the integrity of data is retained even if the owner of the data is malicious. However, providing secure integrity in mobile environments, where participating nodes and their communication channels...
In this paper, we present a short group signature scheme for dynamic membership with controllable link ability. The controllable link ability enables an entity who possesses a special linking key to check if two signatures are from the same signer while preserving anonymity. It can be used for various anonymity-based applications that require necessarily the link ability such as vehicular adhoc network,...
Radio Frequency IDentification (RFID) is a leading ubiquitous computing technology for the future. However, the rapid deployment of low-cost RFID tags in large scale raises significant personal privacy threats. Low-cost tags are extremely resource-constrained devices. Hence it is easy to corrupt a low-cost RFID tag to obtain useful information, trace its history and discover its identity. Therefore...
Many sensor network protocols utilize the existence of disjoint paths (e.g., perfectly secure message transmission or multi-path key establishment), but do not address how a node actually determines these paths in the presence of an adversary. In this paper we investigate what assumptions are necessary to gather information about the local network topology when adversarial nodes are present and capable...
Cognitive radio networks provides solutions for heterogeneous networks convergence. However, security requirements of various wireless standards are different which leads to current authentication mechanisms are not suitable for cognitive radio networks. Therefore, a new authentication mechanism for cognitive radio networks is proposed which is based on third-party Certification Authority (CA). In...
Radio Frequency Identification (RFID) is a technology increasingly used in many applications for object identification. Ownership transfer of RFID tags is also another important requirement for some applications. Namely, the owner of an RFID tag may be required to change several times during its life-cycle. For an ownership transfer, the server of the new owner takes over tag authorization in order...
Security is of critical importance for many potential applications of wireless sensor networks. Broadcasting from base station to nodes is very important in the cases such as distributing secure keys in the network or delivering control commands to nodes. However, the sparse distribution and limited resource of nodes bring difficulties to the efficient and reliable broadcast in wireless sensor networks...
A new way to increase the security of data transmission of mobile ad hoc networks [MANETS] is presented in this work. There is a massive increase in using MANETS for unmanned army system for both surveillance and future combat operations. This has necessitated the development of innovative MANET solutions catering to the reliability, security and scalability needs of the defense communications environment...
Covert channels are malicious conversation in a legitimate secured network communication that violates the security policies laid down. Covert channels are hidden, intended design in the legitimate communication whose motto is to leak information. Trapdoors are unintended design with a communication system that exists in network covert channels as a part of rudimentary protocols. Subliminal channel,...
Decentralized node admission is an essential and fundamental security service in mobile ad hoc networks (MANETs). It is needed to securely cope with dynamic membership and topology as well as to bootstrap other important security primitives (such as key management) and services (such as secure routing) without the assistance of any centralized trusted authority. An ideal admission technique must involve...
RFID technology automates several types of objects identification processes and improves lots of business transactions. Its ability to communicate through wireless networks gives huge advantages in comparison to optical barcode and manual identification systems. Unfortunately, the ability of RFID system to communicate through wireless communication opens up possibilities of being tracked by unauthorized...
Network equipments are developing continually along with the network size expansion. Because switchboard function increasingly intelligent and variety, the relative management system also upgrade and update uninterrupted. Management systems control the network equipments directly, so its property decides the whole network operational capability. Switchboard is the most important equipment of local...
Time synchronization is one of the fundamental techniques for the wireless sensor networks to obtain the real-time effective information. The security of this technology is becoming increasingly important. In this paper, we analyze the security of RBS, the synchronization algorithm in WSN, point out the potential vulnerabilities existing in the algorithm, and propose optimization on security for the...
We propose two strategies to reduce energy consumption for secure data aggregation in wireless sensor networks. While the purpose of data aggregation is to reduce energy consumption, secure data aggregation introduces an overhead making the total energy consumption comparable to naive secure non-aggregation. Another aspect is that the secure data aggregation has higher node congestion than non-aggregation...
Privacy protection is a very important issue during authentications in RFID systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags share a number of key components. Another technique can be to perform group based private authentication that improves the tradeoff between scalability and privacy by dividing...
We propose a novel approach to establish cryptographic keys among mobile users and a networking infrastructure. Our approach comes at a low cost and can either be used as an alternative to existing solutions or can be employed in a complementary way. Our basic observation is that users are often very mobile. As they interact with the infrastructure, each of them leaves a unique trace behind, known...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.