A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Sensor network security: a survey
2009
IEEE Communications Surveys and Tutorials
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications. ...
As sensor networks become wide-spread, security issues become a central concern, especially in mission-critical tasks. ...
or mobility. • Sensor nodes are densely deployed in most environments. • Compared with ad hoc nodes, the number of nodes in a WSN can be several orders of magnitude higher than the nodes in an ad hoc ...
doi:10.1109/surv.2009.090205
fatcat:qcm4ieoqwrdl7ezxffdsdfyk3e
An integrated approach for energy efficient handover and key distribution protocol for secure NC-enabled small cells
2022
Computer Networks
Future wireless networks must serve dense mobile networks with high data rates, keeping energy requirements to a possible minimum. ...
All integrity schemes against pollution attacks generally require proper key distribution and management to ensure security in a mobile environment. ...
support a dense mobile network. ...
doi:10.1016/j.comnet.2022.108806
fatcat:b6fqchixk5d2jh72zfumpid5vm
CRUISE research activities toward ubiquitous intelligent sensing environments
2008
IEEE wireless communications
ACKNOWLEDGMENTS This work has been performed in the framework of the IST-4-027738 NoE CRUISE, which is partly funded by the European Commission. ...
Collaborative Transmission -We focus on exploiting coordinated or collaborative transmission in WSNs, identifying the key parameters and analyzing the performance benefits of using such techniques in terms ...
Topology is also a key attribute since it aids in network performance analysis. ...
doi:10.1109/mwc.2008.4599221
fatcat:rooqdeuamvak7dlgjp3auqlxqu
A SURVEY OF SECURITY VULNERABILITIES IN WIRELESS SENSOR NETWORKS
2016
Nigerian Journal of Technology
Current developments in WSN protocols have not taken security into consideration. ...
Sensor networks offer a powerful combination of distributed sensing, computing and communications. ...
Random Key Predistribution (RKP) is another method that can mitigate Sybil attacks. Here nodes are assigned a random set of keys to enable them communicate with their neighbour. ...
doi:10.4314/njt.v35i2.21
fatcat:jwgo3u4ee5acrd353zg5ztyy2a
Wireless Sensor Network- Challenges and Possibilities
2016
International Journal of Computer Applications
Wireless Sensor Network (WSN) is the current research field in computer science & has growing use in day to day life. ...
It also classifies various security protocols to make WSN a secure network. ...
We can classify [7] key management as: 1) Single network wide key 2) pairwise key establishment 3) Trusted base station 4) public key schemes 5) key predistribution schemes 6) Dynamic key management ...
doi:10.5120/ijca2016909221
fatcat:bv7bgkhltvdqxax37qtcdcyyqu
An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks
[article]
2010
arXiv
pre-print
The mechanism also isolates a compromised node from the network so that it cannot participate in any network activity. ...
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. ...
Security mechanisms deployed in these networks should involve collaborations among the nodes due to the decentralized nature and absence of infrastructure. ...
arXiv:1012.2516v1
fatcat:z3jly4jjirf7jfsvp4reqaeebi
A Survey on Measures for Secure Routing in Wireless Sensor Networks
2012
International Journal of Sensor Networks and Data Communications
In the near future, it is likely that wireless sensor networks (WSNs) become a major technology for the sensing in different application areas. ...
One of the main challenges in WSNs is the secure routing of data through the network. This is resulting from the fact that WSNs are normally deployed in unattended or even hostile environments. ...
key distribution process, which is often needed for authentication and encryption to secure routing in the network. ...
doi:10.4172/2090-4886.1000101
fatcat:mmwfiy53e5fujeiwn44crw5zxa
A Survey on Measures for Secure Routing in Wireless Sensor Networks
2012
International Journal of Sensor Networks and Data Communications
In the near future, it is likely that wireless sensor networks (WSNs) become a major technology for the sensing in different application areas. ...
One of the main challenges in WSNs is the secure routing of data through the network. This is resulting from the fact that WSNs are normally deployed in unattended or even hostile environments. ...
key distribution process, which is often needed for authentication and encryption to secure routing in the network. ...
doi:10.4303/ijsndc/235548
fatcat:xa546pnnlreqdjvnb7qewx2j5i
A lightweight group-key management protocol for secure ad-hoc-network routing
2011
Computer Networks
Secure routing protocols for ad hoc networks use group keys for authenticating control messages without high energy consumption. A distributed and robust group-key management is, thus, essential. ...
The proposed protocol provides an efficient key management in a timely manner. ...
System model
Network model Our protocol works under the assumption of mobile nodes which collaboratively support network operation. ...
doi:10.1016/j.comnet.2010.10.003
fatcat:x7f76mmpsrdetipvf6qtama4au
Security and Privacy for Distributed Multimedia Sensor Networks
2008
Proceedings of the IEEE
This paper discusses issues in designing for security and privacy in distributed multimedia sensor networks. ...
In systems where small, dispersed video-audio sensors feed data to a central observation station, power available for signal processing, networking and cryptography is severely limited and must be conserved ...
Key management in the network requires that each network node have an individual key that is shared with the BS and that pairwise keys be available between adjacent visual nodes in a cluster. ...
doi:10.1109/jproc.2007.909914
fatcat:ny4oibqp4vavnm5s5zvg6akcha
A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols
2017
IEEE Internet of Things Journal
This work culminates in a deeper analysis of network layer attacks deployed against the RPL routing protocol. ...
The increasing pervasiveness of Wireless Sensor Networks (WSNs) in diverse application domains including critical infrastructure systems, sets an extremely high security bar in the design of WSN systems ...
EP/N023242/1, project IoT in the Park. ...
doi:10.1109/jiot.2017.2749883
fatcat:c5zue52z2feyfaqfmgm5mbbfmy
Extending the Lifespan of Wireless Sensor Networks: A Survey of LEACH and Non-LEACH Routing Protocols
2020
International Journal of Computer Applications
This paper reviews some relevant literature on existing routing protocols for wireless sensor network with much emphasis given to the Low Adaptive Clustering Hierarchy (LEACH) protocol, its variant protocols ...
Originated envisaged for military functions, Wireless Sensor Networks (WSN) have gain wide-ranging applicability including in home, business, agriculture, environment monitoring, health care and structural ...
FLEACH security strength including authenticity, integrity and confidentiality lies in the use of both a random key predistribution technique and a symmetric FLEACH combines a random key pre-distribution ...
doi:10.5120/ijca2020919447
fatcat:acrcv2q5g5hdlgd5wf75r76pxe
Wireless Sensor Network Security
2013
International Journal of Distributed Sensor Networks
The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. ...
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section ...
As a result, in a very dense network where d = 50, we will have M ≈ 1KB. ...
doi:10.1155/2013/362385
fatcat:2ph46uukonbtbdkc5q6t4mvgcq
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network
2012
Journal of Networks
Session migration, a key issue in pervasive communications, is evaluated with a user-centric vision. ...
Users' feelings are evaluated with a user-centric networking mobility framework based on the concept of Personal Address. ...
predistribution key management schemes. ...
doi:10.4304/jnw.7.1.88-100
fatcat:7atjgdr7hngvfjvvfibte6d3pm
Capacity analysis of public blockchain
2021
Computer Communications
As distributed ledgers, blockchains run consensus protocols which trade capacity for consistency, especially in non-ideal networks with incomplete connectivity and erroneous links. ...
This paper presents discrete-time Markov chain models to quantify the capacity of Proof-of-Work based public blockchains in non-ideal networks. ...
Zha, et al., Collaborative authentication in decentralized dense mobile
networks with key predistribution 12 (10) (2017) 2261–2275. doi:10.1109/
TIFS.2017.2705584.
[13] F. Tschorsch, B. ...
doi:10.1016/j.comcom.2021.06.019
fatcat:ms5hee273nelrdjwrmmwdu7tqq
« Previous
Showing results 1 — 15 out of 21 results