17,915 Hits in 2.9 sec

Survey of Security Technologies on Wireless Sensor Networks

Qiuwei Yang, Xiaogang Zhu, Hongjuan Fu, Xiqiang Che
2015 Journal of Sensors  
Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields.  ...  to traditional networks, which makes wireless sensor networks face more security threats.  ...  In 2008, An and Peng [17] proposed Tiny ECC certification program and noted that the program is suitable for wireless sensor network applications. Li et al.  ... 
doi:10.1155/2015/842392 fatcat:mewhks7ppbetpi6fjq4huzgrt4


Shrivastava N.P., Bansal D
2020 International Journal of Technical Research & Science  
In this paper a survey of security protocols proposed for wireless sensor is provided, the paper also provides a comparison for the same. Security plays an important part in wireless network.  ...  In the Present work, secure key management for providing security is play a vital role over wireless sensor network.  ...  Since wireless sensor networks use public wireless environment, so there is a need to provide authenticity against the message coming from malicious nodes.  ... 
doi:10.30780/specialissue-icrdet-2019/003 fatcat:u5r77slj3bhqlnofvswa5imkwq

Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge

An Liu, Young-Hyun Oh, Peng Ning
2008 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008)  
Remote Demo in WiSeNeT Testbed We have a testbed for wireless sensor networks named WiSeNeT (Wireless Sensor Network Testbed).  ...  Deluge is generally accepted as the state of the art for code dissemination in wireless sensor networks, and has been included in recent TinyOS distributions [1] .  ... 
doi:10.1109/ipsn.2008.13 dblp:conf/ipsn/LiuON08 fatcat:3mb3o4oiv5doblypqsljqhsece

AMRITA remote triggered wireless sensor network laboratory framework

Maneesha Vinodini Ramesh, Preeja Pradeep, P. Divya, R. D. Arya Devi, P. Rekha, K. Sangeeth, Y. V. Rayudu
2013 Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems - SenSys '13  
designing and implementing wireless sensor networks' algorithms in both indoor and outdoor conditions.  ...  In this paper, we present a real time remote triggered laboratory which has multi-set, multi-group of wireless sensor network experimental setup which is envisioned to provide a practical experience of  ...  IMPLEMENTATION AND RESULTS Our WSN Testbed provides 11 wireless sensor networks which uses memsic micaz motes, where we deployed 9 sensor networks with more than 100 sensor nodes in indoor and 2 sensor  ... 
doi:10.1145/2517351.2517377 dblp:conf/sensys/RameshPDDRSR13 fatcat:jxjoypk5dffstchsxioxhj5taq

Recent Advances in Security and Privacy for Wireless Sensor Networks 2016

Fei Yu, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang, Jose Maria de Fuentes
2017 Journal of Sensors  
We wish to express our deepest thanks to the program committee members for their help in selecting papers for this issue and especially the referees of the extended versions of the selected papers for  ...  In closing, we would like to take this opportunity to thank the authors for the efforts they put in the preparation of the manuscripts and in keeping the deadlines set by editorial requirements.  ...  In the paper entitled "A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks" by D.  ... 
doi:10.1155/2017/3057534 fatcat:y2x5fqe7lbhyfh5fo3lha63w2e

DiDrip: A Secure and Distributed Protocol for Updation and Dissemination of Data in WSN

Shobhna Vedprakash Pandey, Dr. K. Srujan Raju
2016 International Journal of Advanced Engineering Research and Science  
A Wireless sensor network (WSN) is a network together with sensor nodes that connected through wireless media.  ...  Second, most protocols assume that working environment is safe, so attackers can easily harm network. In Wireless Sensor Network, the security and confidentiality of data is very important.  ...  Security in wireless sensor networks is important for monitoring applications in military and civilian operations. For such applications updating the program image securely is more important.  ... 
doi:10.22161/ijaers/3.9.4 fatcat:cc2eabtrcvd6hm5hcjetz7no7i

A Survey on Wireless Sensor Networks Security

Abhishek Pandey, R.C. Tripathi
2010 International Journal of Computer Applications  
In this paper we deal with the security of the wireless sensor networks.  ...  Wireless Sensor Networks(WSN) are a most challenging and emerging technology for the research due to their vital scope in the field coupled with their low processing power and associated low energy.  ...  For wireless sensor networks, programs are written in nesC code. For running nesC code in TOSSIM it requires programming interface i.e. written in Python or C++.  ... 
doi:10.5120/705-989 fatcat:ixuccttuzvcvpis4zn2ob3cf24

Recent Advances in Security and Privacy for Wireless Sensor Networks

Fei Yu, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang, Jose Maria de Fuentes
2015 Journal of Sensors  
We wish to express our deepest thanks to the program committee members for their help in selecting papers for this issue and especially the referees of the extended versions of the selected papers for  ...  Acknowledgments In particular, we would like to acknowledge the program committee members of Seventh International Symposium on Information Processing (ISIP 2014).  ...  Liang et al. a digital certificate based remote data access control scheme is proposed for safe authentication of accessor in wireless sensor network (WSN).  ... 
doi:10.1155/2015/169305 fatcat:qg2biyyagrdaxkau7dtek2dw4q

Wireless Sensor Network Theoretical Findings and Applications

Ashish Patel, Rutvij Jhaveri, Kruti Dangarwala
2013 International Journal of Computer Applications  
This survey paper aims at reporting wireless sensor network, its design, networking of nodes, and security in system. In this paper, fundamentals of wireless sensor network are discussed.  ...  Different component like sensor, microcontroller, battery require for sensor networks are explained in detail. We have tried to include all the aspects of WSN.  ...  In 1993 UCLA started research in WINS -Wireless Integrated Network Sensors.  ... 
doi:10.5120/10503-5270 fatcat:3w7sgytyp5corebkoj5zmvi37y

Identification of Security Threats and Proposed Security Mechanisms for Wireless Sensor Networks

Anusha Medavaka
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
The distinct aspects of sensor networks may enable novel defenses not available in traditional networks.In this paper, we examine the security related concerns and also obstacles in wireless sensor networks  ...  We identify the safety and security threats, testimonial suggested protection devices for wireless sensor networks.  ...  In Table 1 , we have actually summarized different security schemes together with their major properties for wireless sensor network. V.  ... 
doi:10.32628/cseit195370 fatcat:57cejaxxh5hphfvxkd7nufrgca

Data Security and Data Dissemination of Distributed Data in Wireless Sensor Networks

M. Kowsigan
2017 International Journal of Engineering Research and Applications  
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote.  ...  Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network.  ...  After a wireless sensor network (WSN) is utilized, there is normally required to update old small programs or parameters stored in the mote.  ... 
doi:10.9790/9622-0703042631 fatcat:vhkifxecsfarrkup2szp4mk7he

User Authentication Techniques for Wireless Sensor Networks : A Survey

Shakera Shaikh, Veena Gulhane
2012 International Journal of Smart Sensor and Adhoc Network.  
A wireless sensor network(WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments.  ...  This paper synthesizes existing user authentication schemes in wireless sensor networks and highlights the challenges in user authentication.  ...  Fig. 1 : 1 Wireless sensor Network Scenario Table 1 1 summarizes the authentication Techniques surveyed in this paper.  ... 
doi:10.47893/ijssan.2012.1142 fatcat:zxdvg423ezgvlgt33h5453nc3i

Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks

Yong YU, Jianbing NI, Ying SUN
2013 IEICE transactions on information and systems  
Reprogramming for wireless sensor networks is essential to upload new code or to alter the functionality of existing code.  ...  In this letter, unfortunately, we demonstrate that SDRP is insecure as the protocol fails to satisfy the property of authenticity and integrity of code images, the most important security requirement of  ...  Accordingly, distributed reprogramming is more suitable than the traditional approaches for wireless sensor networks.  ... 
doi:10.1587/transinf.e96.d.1875 fatcat:6lwmm6johvhznnzf5gwlyyzjs4

An Effective Security Method Based on Combining 802.1x, DMZ and SSL-VPN for IoT Network Security

İlhan Fırat Kılınçer, Fatih Ertam, Onur Yaman, Abdülkadir Şengür
2020 Acta INFOLOGICA  
Accordingly, 802.1x technology was used to connect wireless sensor devices to a Wi-Fi network. Thus, in the first step, unauthorized users are not allowed to connect to this network.  ...  Considering these advantages, it is considered to be an important work in the field of IoT network security..  ...  With this authentication method, the wireless sensor network infrastructure is secured. TTLS and PAP protocols are used for IEEE 802.1x authentication.  ... 
doi:10.26650/acin.779547 fatcat:kmy7uph67bhgzdqa6ckl57mhqy

Minimizing Denial of Service Attack for Multiple Base Stations in Wireless Sensor Network

Jaffer Wazir, Omar Barukab, Alaa Omran Almagrabi, Sher Afzal Khan
2016 VFAST Transactions on Software Engineering  
Wireless sensor networks is a technology that is gaining growth rapidly. It consists of sensors and these sensors spread on Ad hoc manner in the wireless environment.  ...  The dynamic nature of wireless sensor network makes it easy for Denial of Service attack to capture the network data during transmission [1].  ...  The number of nodes in the wireless sensor network is 200 sensors and the access points are the base stations for data monitoring and controlling.  ... 
doi:10.21015/vtse.v11i2.429 fatcat:vgdvd65gsfd6haey7x2dmy343u
« Previous Showing results 1 — 15 out of 17,915 results