A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Survey of Security Technologies on Wireless Sensor Networks
2015
Journal of Sensors
Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. ...
to traditional networks, which makes wireless sensor networks face more security threats. ...
In 2008, An and Peng [17] proposed Tiny ECC certification program and noted that the program is suitable for wireless sensor network applications. Li et al. ...
doi:10.1155/2015/842392
fatcat:mewhks7ppbetpi6fjq4huzgrt4
REVIEW ON DYNAMIC KEY SECURITY PROTOCOLS IN WIRELESS SENSOR NETWORK USING PSEUDORANDOM NUMBER GENERATOR
2020
International Journal of Technical Research & Science
In this paper a survey of security protocols proposed for wireless sensor is provided, the paper also provides a comparison for the same. Security plays an important part in wireless network. ...
In the Present work, secure key management for providing security is play a vital role over wireless sensor network. ...
Since wireless sensor networks use public wireless environment, so there is a need to provide authenticity against the message coming from malicious nodes. ...
doi:10.30780/specialissue-icrdet-2019/003
fatcat:u5r77slj3bhqlnofvswa5imkwq
Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge
2008
2008 International Conference on Information Processing in Sensor Networks (ipsn 2008)
Remote Demo in WiSeNeT Testbed We have a testbed for wireless sensor networks named WiSeNeT (Wireless Sensor Network Testbed). ...
Deluge is generally accepted as the state of the art for code dissemination in wireless sensor networks, and has been included in recent TinyOS distributions [1] . ...
doi:10.1109/ipsn.2008.13
dblp:conf/ipsn/LiuON08
fatcat:3mb3o4oiv5doblypqsljqhsece
AMRITA remote triggered wireless sensor network laboratory framework
2013
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems - SenSys '13
designing and implementing wireless sensor networks' algorithms in both indoor and outdoor conditions. ...
In this paper, we present a real time remote triggered laboratory which has multi-set, multi-group of wireless sensor network experimental setup which is envisioned to provide a practical experience of ...
IMPLEMENTATION AND RESULTS Our WSN Testbed provides 11 wireless sensor networks which uses memsic micaz motes, where we deployed 9 sensor networks with more than 100 sensor nodes in indoor and 2 sensor ...
doi:10.1145/2517351.2517377
dblp:conf/sensys/RameshPDDRSR13
fatcat:jxjoypk5dffstchsxioxhj5taq
Recent Advances in Security and Privacy for Wireless Sensor Networks 2016
2017
Journal of Sensors
We wish to express our deepest thanks to the program committee members for their help in selecting papers for this issue and especially the referees of the extended versions of the selected papers for ...
In closing, we would like to take this opportunity to thank the authors for the efforts they put in the preparation of the manuscripts and in keeping the deadlines set by editorial requirements. ...
In the paper entitled "A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks" by D. ...
doi:10.1155/2017/3057534
fatcat:y2x5fqe7lbhyfh5fo3lha63w2e
DiDrip: A Secure and Distributed Protocol for Updation and Dissemination of Data in WSN
2016
International Journal of Advanced Engineering Research and Science
A Wireless sensor network (WSN) is a network together with sensor nodes that connected through wireless media. ...
Second, most protocols assume that working environment is safe, so attackers can easily harm network. In Wireless Sensor Network, the security and confidentiality of data is very important. ...
Security in wireless sensor networks is important for monitoring applications in military and civilian operations. For such applications updating the program image securely is more important. ...
doi:10.22161/ijaers/3.9.4
fatcat:cc2eabtrcvd6hm5hcjetz7no7i
A Survey on Wireless Sensor Networks Security
2010
International Journal of Computer Applications
In this paper we deal with the security of the wireless sensor networks. ...
Wireless Sensor Networks(WSN) are a most challenging and emerging technology for the research due to their vital scope in the field coupled with their low processing power and associated low energy. ...
For wireless sensor networks, programs are written in nesC code. For running nesC code in TOSSIM it requires programming interface i.e. written in Python or C++. ...
doi:10.5120/705-989
fatcat:ixuccttuzvcvpis4zn2ob3cf24
Recent Advances in Security and Privacy for Wireless Sensor Networks
2015
Journal of Sensors
We wish to express our deepest thanks to the program committee members for their help in selecting papers for this issue and especially the referees of the extended versions of the selected papers for ...
Acknowledgments In particular, we would like to acknowledge the program committee members of Seventh International Symposium on Information Processing (ISIP 2014). ...
Liang et al. a digital certificate based remote data access control scheme is proposed for safe authentication of accessor in wireless sensor network (WSN). ...
doi:10.1155/2015/169305
fatcat:qg2biyyagrdaxkau7dtek2dw4q
Wireless Sensor Network Theoretical Findings and Applications
2013
International Journal of Computer Applications
This survey paper aims at reporting wireless sensor network, its design, networking of nodes, and security in system. In this paper, fundamentals of wireless sensor network are discussed. ...
Different component like sensor, microcontroller, battery require for sensor networks are explained in detail. We have tried to include all the aspects of WSN. ...
In 1993 UCLA started research in WINS -Wireless Integrated Network Sensors. ...
doi:10.5120/10503-5270
fatcat:3w7sgytyp5corebkoj5zmvi37y
Identification of Security Threats and Proposed Security Mechanisms for Wireless Sensor Networks
2019
International Journal of Scientific Research in Computer Science Engineering and Information Technology
The distinct aspects of sensor networks may enable novel defenses not available in traditional networks.In this paper, we examine the security related concerns and also obstacles in wireless sensor networks ...
We identify the safety and security threats, testimonial suggested protection devices for wireless sensor networks. ...
In Table 1 , we have actually summarized different security schemes together with their major properties for wireless sensor network.
V. ...
doi:10.32628/cseit195370
fatcat:57cejaxxh5hphfvxkd7nufrgca
Data Security and Data Dissemination of Distributed Data in Wireless Sensor Networks
2017
International Journal of Engineering Research and Applications
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. ...
Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. ...
After a wireless sensor network (WSN) is utilized, there is normally required to update old small programs or parameters stored in the mote. ...
doi:10.9790/9622-0703042631
fatcat:vhkifxecsfarrkup2szp4mk7he
User Authentication Techniques for Wireless Sensor Networks : A Survey
2012
International Journal of Smart Sensor and Adhoc Network.
A wireless sensor network(WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. ...
This paper synthesizes existing user authentication schemes in wireless sensor networks and highlights the challenges in user authentication. ...
Fig. 1 : 1 Wireless sensor Network Scenario
Table 1 1 summarizes the authentication Techniques surveyed in this paper. ...
doi:10.47893/ijssan.2012.1142
fatcat:zxdvg423ezgvlgt33h5453nc3i
Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks
2013
IEICE transactions on information and systems
Reprogramming for wireless sensor networks is essential to upload new code or to alter the functionality of existing code. ...
In this letter, unfortunately, we demonstrate that SDRP is insecure as the protocol fails to satisfy the property of authenticity and integrity of code images, the most important security requirement of ...
Accordingly, distributed reprogramming is more suitable than the traditional approaches for wireless sensor networks. ...
doi:10.1587/transinf.e96.d.1875
fatcat:6lwmm6johvhznnzf5gwlyyzjs4
An Effective Security Method Based on Combining 802.1x, DMZ and SSL-VPN for IoT Network Security
2020
Acta INFOLOGICA
Accordingly, 802.1x technology was used to connect wireless sensor devices to a Wi-Fi network. Thus, in the first step, unauthorized users are not allowed to connect to this network. ...
Considering these advantages, it is considered to be an important work in the field of IoT network security.. ...
With this authentication method, the wireless sensor network infrastructure is secured. TTLS and PAP protocols are used for IEEE 802.1x authentication. ...
doi:10.26650/acin.779547
fatcat:kmy7uph67bhgzdqa6ckl57mhqy
Minimizing Denial of Service Attack for Multiple Base Stations in Wireless Sensor Network
2016
VFAST Transactions on Software Engineering
Wireless sensor networks is a technology that is gaining growth rapidly. It consists of sensors and these sensors spread on Ad hoc manner in the wireless environment. ...
The dynamic nature of wireless sensor network makes it easy for Denial of Service attack to capture the network data during transmission [1]. ...
The number of nodes in the wireless sensor network is 200 sensors and the access points are the base stations for data monitoring and controlling. ...
doi:10.21015/vtse.v11i2.429
fatcat:vgdvd65gsfd6haey7x2dmy343u
« Previous
Showing results 1 — 15 out of 17,915 results