Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








21 Hits in 7.1 sec

Sensor network security: a survey

Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou
2009 IEEE Communications Surveys and Tutorials  
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications.  ...  As sensor networks become wide-spread, security issues become a central concern, especially in mission-critical tasks.  ...  or mobility. • Sensor nodes are densely deployed in most environments. • Compared with ad hoc nodes, the number of nodes in a WSN can be several orders of magnitude higher than the nodes in an ad hoc  ... 
doi:10.1109/surv.2009.090205 fatcat:qcm4ieoqwrdl7ezxffdsdfyk3e

An integrated approach for energy efficient handover and key distribution protocol for secure NC-enabled small cells

Vipindev Adat Vasudevan, Muhammad Tayyab, George P. Koudouridis, Xavier Gelabert, Ilias Politis
2022 Computer Networks  
Future wireless networks must serve dense mobile networks with high data rates, keeping energy requirements to a possible minimum.  ...  All integrity schemes against pollution attacks generally require proper key distribution and management to ensure security in a mobile environment.  ...  support a dense mobile network.  ... 
doi:10.1016/j.comnet.2022.108806 fatcat:b6fqchixk5d2jh72zfumpid5vm

CRUISE research activities toward ubiquitous intelligent sensing environments

A. Mitseva, N. Prasad, P. Todorova, F. Fokus, R. Aguero, A. Garcia Armada, C. Panayiotou, A.G. Timm-Giel, L. Maccari
2008 IEEE wireless communications  
ACKNOWLEDGMENTS This work has been performed in the framework of the IST-4-027738 NoE CRUISE, which is partly funded by the European Commission.  ...  Collaborative Transmission -We focus on exploiting coordinated or collaborative transmission in WSNs, identifying the key parameters and analyzing the performance benefits of using such techniques in terms  ...  Topology is also a key attribute since it aids in network performance analysis.  ... 
doi:10.1109/mwc.2008.4599221 fatcat:rooqdeuamvak7dlgjp3auqlxqu

A SURVEY OF SECURITY VULNERABILITIES IN WIRELESS SENSOR NETWORKS

VE Ekong, UO Ekong
2016 Nigerian Journal of Technology  
Current developments in WSN protocols have not taken security into consideration.  ...  Sensor networks offer a powerful combination of distributed sensing, computing and communications.  ...  Random Key Predistribution (RKP) is another method that can mitigate Sybil attacks. Here nodes are assigned a random set of keys to enable them communicate with their neighbour.  ... 
doi:10.4314/njt.v35i2.21 fatcat:jwgo3u4ee5acrd353zg5ztyy2a

Wireless Sensor Network- Challenges and Possibilities

Amit Rathee, Randeep Singh, Abhishilpa Nandini
2016 International Journal of Computer Applications  
Wireless Sensor Network (WSN) is the current research field in computer science & has growing use in day to day life.  ...  It also classifies various security protocols to make WSN a secure network.  ...  We can classify [7] key management as: 1) Single network wide key 2) pairwise key establishment 3) Trusted base station 4) public key schemes 5) key predistribution schemes 6) Dynamic key management  ... 
doi:10.5120/ijca2016909221 fatcat:bv7bgkhltvdqxax37qtcdcyyqu

An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks [article]

Jaydip Sen
2010 arXiv   pre-print
The mechanism also isolates a compromised node from the network so that it cannot participate in any network activity.  ...  Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications.  ...  Security mechanisms deployed in these networks should involve collaborations among the nodes due to the decentralized nature and absence of infrastructure.  ... 
arXiv:1012.2516v1 fatcat:z3jly4jjirf7jfsvp4reqaeebi

A Survey on Measures for Secure Routing in Wireless Sensor Networks

Ansgar Kellner, Omar Alfandi
2012 International Journal of Sensor Networks and Data Communications  
In the near future, it is likely that wireless sensor networks (WSNs) become a major technology for the sensing in different application areas.  ...  One of the main challenges in WSNs is the secure routing of data through the network. This is resulting from the fact that WSNs are normally deployed in unattended or even hostile environments.  ...  key distribution process, which is often needed for authentication and encryption to secure routing in the network.  ... 
doi:10.4172/2090-4886.1000101 fatcat:mmwfiy53e5fujeiwn44crw5zxa

A Survey on Measures for Secure Routing in Wireless Sensor Networks

Ansgar Kellner, Omar Alfandi, Dieter Hogrefe
2012 International Journal of Sensor Networks and Data Communications  
In the near future, it is likely that wireless sensor networks (WSNs) become a major technology for the sensing in different application areas.  ...  One of the main challenges in WSNs is the secure routing of data through the network. This is resulting from the fact that WSNs are normally deployed in unattended or even hostile environments.  ...  key distribution process, which is often needed for authentication and encryption to secure routing in the network.  ... 
doi:10.4303/ijsndc/235548 fatcat:xa546pnnlreqdjvnb7qewx2j5i

A lightweight group-key management protocol for secure ad-hoc-network routing

Natalia Castro Fernandes, Otto Carlos Muniz Bandeira Duarte
2011 Computer Networks  
Secure routing protocols for ad hoc networks use group keys for authenticating control messages without high energy consumption. A distributed and robust group-key management is, thus, essential.  ...  The proposed protocol provides an efficient key management in a timely manner.  ...  System model Network model Our protocol works under the assumption of mobile nodes which collaboratively support network operation.  ... 
doi:10.1016/j.comnet.2010.10.003 fatcat:x7f76mmpsrdetipvf6qtama4au

Security and Privacy for Distributed Multimedia Sensor Networks

D. Kundur, W. Luh, U.N. Okorafor, T. Zourntos
2008 Proceedings of the IEEE  
This paper discusses issues in designing for security and privacy in distributed multimedia sensor networks.  ...  In systems where small, dispersed video-audio sensors feed data to a central observation station, power available for signal processing, networking and cryptography is severely limited and must be conserved  ...  Key management in the network requires that each network node have an individual key that is shared with the BS and that pairwise keys be available between adjacent visual nodes in a cluster.  ... 
doi:10.1109/jproc.2007.909914 fatcat:ny4oibqp4vavnm5s5zvg6akcha

A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols

Ivana Tomic, Julie A. McCann
2017 IEEE Internet of Things Journal  
This work culminates in a deeper analysis of network layer attacks deployed against the RPL routing protocol.  ...  The increasing pervasiveness of Wireless Sensor Networks (WSNs) in diverse application domains including critical infrastructure systems, sets an extremely high security bar in the design of WSN systems  ...  EP/N023242/1, project IoT in the Park.  ... 
doi:10.1109/jiot.2017.2749883 fatcat:c5zue52z2feyfaqfmgm5mbbfmy

Extending the Lifespan of Wireless Sensor Networks: A Survey of LEACH and Non-LEACH Routing Protocols

Yakubu Abdul-Wahab, Abdul-Barik Alhassan, Abdul-Mumin Salifu
2020 International Journal of Computer Applications  
This paper reviews some relevant literature on existing routing protocols for wireless sensor network with much emphasis given to the Low Adaptive Clustering Hierarchy (LEACH) protocol, its variant protocols  ...  Originated envisaged for military functions, Wireless Sensor Networks (WSN) have gain wide-ranging applicability including in home, business, agriculture, environment monitoring, health care and structural  ...  FLEACH security strength including authenticity, integrity and confidentiality lies in the use of both a random key predistribution technique and a symmetric FLEACH combines a random key pre-distribution  ... 
doi:10.5120/ijca2020919447 fatcat:acrcv2q5g5hdlgd5wf75r76pxe

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ...  Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  As a result, in a very dense network where d = 50, we will have M ≈ 1KB.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network

Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai
2012 Journal of Networks  
Session migration, a key issue in pervasive communications, is evaluated with a user-centric vision.  ...  Users' feelings are evaluated with a user-centric networking mobility framework based on the concept of Personal Address.  ...  predistribution key management schemes.  ... 
doi:10.4304/jnw.7.1.88-100 fatcat:7atjgdr7hngvfjvvfibte6d3pm

Capacity analysis of public blockchain

Xu Wang, Wei Ni, Xuan Zha, Guangsheng Yu, Ren Ping Liu, Nektarios Georgalas, Andrew Reeves
2021 Computer Communications  
As distributed ledgers, blockchains run consensus protocols which trade capacity for consistency, especially in non-ideal networks with incomplete connectivity and erroneous links.  ...  This paper presents discrete-time Markov chain models to quantify the capacity of Proof-of-Work based public blockchains in non-ideal networks.  ...  Zha, et al., Collaborative authentication in decentralized dense mobile networks with key predistribution 12 (10) (2017) 2261–2275. doi:10.1109/ TIFS.2017.2705584. [13] F. Tschorsch, B.  ... 
doi:10.1016/j.comcom.2021.06.019 fatcat:ms5hee273nelrdjwrmmwdu7tqq
« Previous Showing results 1 — 15 out of 21 results