Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,811 Hits in 4.7 sec

AN INVESTIGATION STUDY ON ENERGY EFFICIENT AUTHENTICATION TECHNIQUES IN WIRELESS SENSOR NETWORK

Antony Cynthia
2018 International Journal of Advanced Research in Computer Science  
Wireless sensor networks (WSNs) are ubiquitous technology for the growth of low cost and low power wireless technology.  ...  In existing authentication methods, key management schemes and hashing techniques were used for increasing the authentication and security level performance.  ...  BASIS: A Practical Multi-User Broadcast Authentication Scheme for Wireless Sensor Networks WSN includes sink node, sensor node, and users.  ... 
doi:10.26483/ijarcs.v9i2.5893 fatcat:xbpwxfzmhng53cfcffnkznfb3e

Survey of Security Technologies on Wireless Sensor Networks

Qiuwei Yang, Xiaogang Zhu, Hongjuan Fu, Xiqiang Che
2015 Journal of Sensors  
Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields.  ...  to traditional networks, which makes wireless sensor networks face more security threats.  ...  Wireless sensor networks have a very important scientific and practical value.  ... 
doi:10.1155/2015/842392 fatcat:mewhks7ppbetpi6fjq4huzgrt4

A Survey On Security In Wireless Sensor Network

Faris Fazlic, Seyed Ali Hashemi, Ahmed Aletic, Ali Abd Almisreb, Syamimi Mohd Norzeli, Norashidah Md Din
2019 Southeast Europe Journal of Soft Computing  
Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs).  ...  In this paper we present a survey of security issues in WSNs, address the state of the art in research on sensor network security, and discuss some future directions for research.  ...  But their scheme is designed for only one sensor node to authenticate the user, not the whole wireless sensor networks.  ... 
doi:10.21533/scjournal.v8i1.174 fatcat:5qi4jzi6g5cfldjyuhyf2qku7u

LIRA: A new key deployment scheme for Wireless Body Area Networks

Tonko Kovacevic, Toni Perkovic, Mario Cagalj
2013 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013)  
However, there is still a need to ensure a reliable and secure communication in these systems. In this paper we present a novel multi-channel key deployment scheme for wireless body sensor networks.  ...  A rapid development of the Wireless Body Area Network (WBAN) has become very important for applications in telemedicine and m-health.  ...  [24] propose a new practical and interoperable key management scheme for BSN, KALwEN.  ... 
doi:10.1109/softcom.2013.6671884 dblp:conf/softcom/KovacevicPC13 fatcat:ejma2liev5bjvjnbzqjiy7cxta

EFFICIENT KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

Lalitha
2014 American Journal of Applied Sciences  
In this study, we develop a cluster based technique for key management in wireless sensor network.  ...  Due to large number of sensor nodes and lack of information about deployment and hardware capabilities of sensor node, key management in wireless sensor networks has become a complex task.  ...  INTRODUCTION Wireless Sensor Network A network comprising of several minute wireless sensor nodes which are organized in a dense manner is called as a Wireless Sensor Network (WSN).  ... 
doi:10.3844/ajassp.2014.969.977 fatcat:n7rbspv75rhmbdxj7jrrdrfobu

LTA: A Linked Timestamp based Authentication Protocol for Sensor Network

Amit Kumar Gautam, Rakesh Kumar
2019 International Journal of Security and Its Applications  
Security in wireless communication is a major concern not only for authenticated sources but also for transfer consistent data from sender nodes to base station while maintains network obtainability.  ...  Wireless Sensor Networks (WSNs) comprised of numerous spatially scattered autonomous devices that receive and transmit data using an insecure wireless channel.  ...  INTRODUCTION Wireless Sensor Networks (WSNs) are a key technology in the twentieth century because of its compact size, cheap, and facility to work in remote hostile locations.  ... 
doi:10.33832/ijsia.2019.13.4.10 fatcat:bzxkuhz7irb4jehusdlursnev4

Performance Evaluation of Secure Asymmetric Key Exchange Mechanisms for 4G Networks

Niharika Singh, Mandeep Singh Saini
2015 International Journal of Computer Applications  
This performance evaluation survey will evaluate these two authentication methods for various scenarios in the 4G network.  ...  The 4G network are cellular network which provides higher bandwidth and fast speed but there are few security flaws and thus to protect the users privacy,a very well defined security support is mandatory  ...  layer solution against selective interference in network TDMA-based sensors which does not require a central entity, sensor nodes need to rely solely on local information and allows them to join and leave  ... 
doi:10.5120/20884-3644 fatcat:hfhn2rs3r5bbhgqp5iwln2m7lm

ASK-BAN

Lu Shi, Jiawei Yuan, Shucheng Yu, Ming Li
2013 Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks - WiSec '13  
In this paper, for the first time, we answer this open problem in the setting of Wireless Body Area Networks (BANs).  ...  We propose ASK-BAN, a lightweight fast authenticated secret key extraction scheme for intra-BAN communication. Our scheme neither introduces any advanced hardware nor relies on out-of-band channels.  ...  In this paper, we answer this open problem in the setting of wireless Body Area Networks (BANs) and propose a lightweight, body movement-aided authenticated secret key extraction scheme for intra-BAN communication  ... 
doi:10.1145/2462096.2462123 dblp:conf/wisec/ShiYYL13 fatcat:sccj3gip7zfhtfyz663ptdzhvi

IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management

Yulei Wu, Zheng Yan, Kim-Kwang Raymond Choo, Laurence T. Yang
2019 IEEE Access  
opportunity broadcast protocol for trustworthy data dissemination in wireless sensor networks,'' by Lai and Wang.  ...  In the former, the authors proposed a practical, conditional privacypreserving authentication scheme.  ... 
doi:10.1109/access.2019.2915489 fatcat:duhaq23h2rbejboby3hhxvnzse

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

Dong Chen
2012 KSII Transactions on Internet and Information Systems  
First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed  ...  In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems.  ...  Broadcast authentication is a critical security service in WSNs, as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure way.  ... 
doi:10.3837/tiis.2012.01.002 fatcat:ycyufngdtrdobmu33j3wqizydy

A novel authentication and access control framework in wireless sensor networks

Babak Nouri-Moghaddam, Hamid Reza Naji
2015 Journal of Advanced Computer Science & Technology  
Wireless Sensor Networking continues to evolve as one of the most challenging research areas.  ...  Considering the insecure nature of these networks and the fact that sensor nodes are distributed in a hostile environment, having a wellimplemented security scheme is absolutely essential.  ...  Identity-based Multi-user Broadcast Authentication System (IMBAS) is another broadcast authentication approach put forward by Cao et al. [4] .  ... 
doi:10.14419/jacst.v4i1.4307 fatcat:agd2xhqm2zgbjizfqtk23tq34e

Fast authentication in wireless sensor networks

Chafika Benzaid, Karim Lounis, Ameer Al-Nemrat, Nadjib Badache, Mamoun Alazab
2016 Future generations computer systems  
Broadcast authentication is a fundamental security service in wireless sensor networks (WSNs).  ...  Thus, speeding up signature verification is a problem of considerable practical importance, especially in resource-constrained environments.  ...  Introduction In wireless sensor networks, message broadcast is an efficient and a common communication paradigm that allows a multitude of users to join in and disseminate messages into the network dynamically  ... 
doi:10.1016/j.future.2014.07.006 fatcat:ybczbdfudjh7rcetqda7ch36oe

Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

Pardeep Kumar, Hoon-Jae Lee
2011 Sensors  
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs).  ...  In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios.  ...  Considering another example, an athlete is being monitored using a wireless sensor network while he/she is practicing in the club [65] .  ... 
doi:10.3390/s120100055 pmid:22368458 pmcid:PMC3279202 fatcat:yfaq2ilem5cm7mpacaafsjgwga

Path Mechanism to reduce packet data loss in Wireless Mesh Networks

Rajinder Singh, Er. Nidhi Bhalla
2012 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
A wireless mesh network (WMN) is a communicationnetwork made up of radio nodes organized in a meshtopology. Wireless mesh network often consists of meshclients, mesh routers and gateways.  ...  A wireless Mesh networkuses multi-hop communication. Due to multi-hop architectureand wireless nature, Mesh networks are vulnerable to varioustypes of Denial of Services attack.  ...  The scheme is independent of the routing protocol or network architecture, and is suitable for multi-channel wireless mesh network [15] . M.  ... 
doi:10.24297/ijct.v2i3c.6779 fatcat:zhqhcb5sxbafpfl6zmlutn4yy4

Wireless Medical Sensor Data Patronage

M. Akshay Goud
2018 International Journal for Research in Applied Science and Engineering Technology  
Nowadays, Wireless Sensor Network is used on a large scale.  ...  These networks are eavesdropping, middleman attacks, impersonation, replaying attacks compared to the wired networks. Previously many trials were done in order to protect the wireless sensor network.  ...  In this paper, we propose the policy in such a way the insider attacks as well. The design of the policy on the basis of the data integrity, the authentication and access. II.  ... 
doi:10.22214/ijraset.2018.3372 fatcat:v7w2ahtjz5fybf7w3vtpv7v3rq
« Previous Showing results 1 — 15 out of 2,811 results