Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The area of security for heterogeneous sensor networks (HSNs) is still an open research field that requires new cryptographic solutions. Recent results have demonstrated that elliptic curve cryptography (ECC) and pairing-based cryptography (PBC) are computationally feasible on sensor devices. This allows a wide range of novel security mechanisms, like identity-based encryption (IBE), to be considered...
Wireless sensor network has been widely used and its real-time data processing capability is very limited. This paper puts forward a new solution, which is the novel wireless sensor network node design with hyperchaos encryption based on FPGA. With the wide application on wireless sensor network based on ZigBee protocol, we encrypt the transported data in the network using hyperchaos by FPGA, which...
Freshness is one of the most desired security properties of sensor network communication architecture. And sequence number is a common technique that is used as a freshness identifier to achieve freshness transmission. However, due to characteristics of wireless sensor network, such as resource-constrained and attack prone, it is vulnerable and energy-expensive to transmit sequence number directly...
This paper proposes an encryption scheme based on key pre-distribution for wireless sensor network (WSN), which fulfills perfectly all the security requirements in WSN using the counter and message authentication code during the encryption process. Furthermore, the related protocols or algorithms are very simple and no expensive public-key operation is required in view of resource-starved sensor nodes,...
Modern wireless communication system based on wireless sensor network is strictly depends on medium access mechanism to improve its performance. CSMA is modifying here in its CSMA/CA format and trying to enhancing its performance same as CSMA/CD has for wired network. The aim of the paper is to inform how optimization of CSMA based sensor network is possible and how we can deploy it for monitoring...
The inexpensive tiny wireless sensor can be embedded in devices to enable any commercial application, but are prone to intruder attacks. Due to the limited resource constraint in wireless sensor network, security in protocols is sacrificed or kept minimal. The distributive and self-organizing nature of sensor based on environment requires protocol to be adaptive, energy efficient and secure. In this...
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encryption. But all of them only address part of the problem of security in wireless sensor networks. Recently, the use of reputation and trust systems has become an important secure mechanism in wireless sensor networks. In this...
Sensor networks are expected to be used at anywhere in the near future and recently their security problems have been rising. Due to the limited computing power of senor nodes, it is impossible to use asymmetric cryptography approaches for the session key establishment or to apply advanced encryption method such as AES and DES for the data encryption. In this paper, therefore, we propose a key establishment...
Traditional networks are built on the assumption that network entities cooperate based on a mandatory network communication semantic to achieve desirable qualities such as efficiency and scalability. Over the years, this assumption has been eroded by the emergence of users that alter network behavior in a way to benefit themselves at the expense of others. At one extreme, a malicious user/node may...
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication purposes must be agreed upon by communicating nodes. In this paper, we propose a new random pre-distribution key management scheme that meets the operational and security requirements of wireless sensor networks and provide...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.