127 Hits in 2.9 sec

Confronting a mobile adversary in unattended sensor networks

Gene Tsudik
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
Unattended sensor networks operating in hostile environments might collect data that represents a high-value target for the adversary.  ...  Unfortunately, since the network is unattended  ...  This talk will address several flavors of the mobile adversary in the context of unattended sensor networks, discuss some viable and simple counter-measures (with varying degrees of effectiveness) and  ... 
doi:10.1145/1368310.1368312 dblp:conf/ccs/Tsudik08 fatcat:ogpkwiprjjdwho4r36vq4mltw4

Energy Efficient Finite Range Query Scheme for Detecting Mobile Adversary Replica Nodes in Wireless Sensor Networks

S. Kumaravel
2012 International Journal of Computer Applications  
With the growing demand in wireless sensor network (WSN), adversary attack on sensor node becomes major issue in current WSN deployment.  ...  the sensor networks.  ...  INTRODUCTION A latest set of security confronts grows in WSN because of the fact in which present sensor nodes require hardware maintain for tamper-resistance and are frequently arranged in unattended  ... 
doi:10.5120/6331-8692 fatcat:zhu2mbuxkjg3vmdqw2wqsrjeyq

Wireless sensor networks security issues and challenges: A survey

Vikhyath K B, Dr Brahmanand S. H
2018 International Journal of Engineering & Technology  
As wireless sensor networks continue to develop, there is a high importance in security mechanisms.  ...  Wireless Sensor Network (WSN) is a rising technology that offers a great assurance towards a variety of revolutionary applications such as military and public.  ...  Unattended Operation: The functionality of the sensor network plays a very important role, in making the sensor node unattended for a period of time.  ... 
doi:10.14419/ijet.v7i2.33.13861 fatcat:fbadfvivgfcx7oq4hkrgqbadii

Deployment of Query Validation for Finite Range Query Scheme in Wireless Sensor Networks

S. Kumaravel
2012 International Journal of Applied Information Systems  
Adversary attack on wireless sensor network is a very major issue on wireless sensor networks deployment.  ...  of mobile sensor nodes.  ...  CONCLUSION The proposal work presented Deployment of Query Validation Scheme for Detecting and validating the Mobile Adversary Replica Nodes in Wireless Sensor Networks in which it expands replica detection  ... 
doi:10.5120/ijais12-450579 fatcat:njiv4sgacfexlimroqt4np62sm

Energy saving Wireless Sensor Networks using Kerberos

Upasana Bahuguna, Anju Devi, Shashi Bhusan
2014 International Journal of Computer Applications Technology and Research  
between the sensor nodes in the network.  ...  The wireless sensor network is an networking field that combines sensing, computation, and communication into a single tiny device.  ...  to unattended sensors, it is a confront to provide security in WSNs.  ... 
doi:10.7753/ijcatr0305.1004 fatcat:xkyeqt5vozdc3dtzuyqgkrkhde

Security in wireless ad-hoc networks – A survey

R. Di Pietro, S. Guarino, N.V. Verde, J. Domingo-Ferrer
2014 Computer Communications  
9 Pervasive mobile and low-end wireless technologies, such as radiofrequency identification (RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs), make the wireless scenario  ...  In this case, communications rely on the ability 17 of the nodes to form a multi-hop radio network.  ...  This adversary is analyzed in [95], 830 where the attacker can control a fixed portion of the network deployment area, 831 and compromise all sensors that move within it following a particular mobil-832  ... 
doi:10.1016/j.comcom.2014.06.003 fatcat:dxpctx3ta5c6fllp2pxacffl2y

Storage-optimal key sharing with authentication in sensor networks

Jian Wang, Zyxia, L. Harn
2005 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems  
When sensor networks are deployed in a hostile environment, security becomes extremely important, as these networks are prone to different types of malicious attacks.  ...  Sensor networks usually consist of a large number of ultra-small autonomous devices.  ...  Typically  sensors are mass-produced anonymous commodity devices that are initially unaware of their location. Once deployed, sensors should self-organize into a network that works unattended. 4.  ... 
doi:10.1109/mtas.2005.243759 fatcat:dz7l2johsfeqpl53axiax5w5aq

Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks

Attila Altay Yavuz, Peng Ning
2009 Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services  
Unattended Wireless Sensor Networks (UWSNs) operating in hostile environments face great security and performance challenges due to the lack of continuous real-time communication between senders (sensors  ...  Moreover, non-real-time characteristic of UWSNs makes sensors vulnerable especially to active adversaries, which compromise sensors and extract all data stored in them.  ...  They first propose mobile adversary models, in which the adversary compromises the sensors and deletes the data accumulated in them.  ... 
doi:10.4108/icst.mobiquitous2009.6824 dblp:conf/mobiquitous/YavuzN09 fatcat:xqwkjwfoarayvl6njbgp7o6s5a

The New Era of Counterforce: Technological Change and the Future of Nuclear Deterrence

Keir A. Lieber, Daryl G. Press
2017 International Security  
Changes in technology, however, are eroding the foundation of nuclear deterrence. Rooted in the computer revolution, these advances are making nu-Keir A.  ...  A nuclear arsenal designed for deterrence must, therefore, be able to survive an enemy ªrst strike and still inºict unacceptable damage on the attacker.  ...  UAVs and unattended ground sensors.  ... 
doi:10.1162/isec_a_00273 fatcat:s57c7mhhrzh7xib4sgoal4e4vm

Distributed Clone Detection in Static Wireless Sensor Networks: Random Walk with Network Division

Wazir Zada Khan, Mohammed Y. Aalsalem, N. M. Saad, Cheng-Yi Xia
2015 PLoS ONE  
Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are deprived of physical protection, lacking  ...  As a result, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones/replicas into the network.  ...  The authors also like to thank Prof Yang Xiang and Dr T H Luan of School of Information Technology, Deakin University, Australia for their valuable suggestions to in improve our idea.  ... 
doi:10.1371/journal.pone.0123069 pmid:25992913 pmcid:PMC4436320 fatcat:zl2x77lm2fa27cehohivsesdnq

Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks

Wenting Li, Bin Li, Yiming Zhao, Ping Wang, Fushan Wei
2018 Wireless Communications and Mobile Computing  
Nowadays wireless sensor networks (WSNs) have drawn great attention from both industrial world and academic community.  ...  To facilitate real-time data access for external users from the sensor nodes directly, password-based authentication has become the prevalent authentication mechanism in the past decades.  ...  The private information is usually stored in distributed cloud servers (e.g., sensors), so that distributed nodes are confronted with the same security threats of sensors in wireless sensor networks.  ... 
doi:10.1155/2018/8539674 fatcat:jsmeiloyw5huzcjriwvrw4brse

To Propose a Novel Technique for Detection and Isolation of Misdirection Attack in Wireless Sensor Network

Meenu Saini, Rajan Kumar, Jasleen Kaur
2016 Indian Journal of Science and Technology  
Method: In this manner, a novel procedure has been proposed for the detection and isolation of the misdirection assault in Wireless Sensor Networks.  ...  It has been analyzed that network throughput is to raise and the delay and energy utilization of the sensor nodes lessened.  ...  Attacks in Wireless Sensor Network There can be number of malignant attacks which are confronted with remote sensor systems on Network layers which can be characterized as beneath.  ... 
doi:10.17485/ijst/2016/v9i28/95338 fatcat:i4zdxzbzgfh4jlwqybpqpezk5e

Dreaming of clean nukes

Michael A. Levi
2004 Nature  
Understanding Adversaries 7-20 Topic Conclusion (agent) Understanding adversaries Networked sensors arrays • Begin to develop an integrated architecture and demon- stration system for networked  ...  INFRA- STRUCTURE COMMAND AND CONTROL MAJOR POWER fixed, mobile, HDB mobile, HDB fixed, mobile fixed fixed, HDB Type of Adversary ROGUE AND/OR TERRORIST fixed, mobile, HDB  ...  In addition to the development of sensors and tags, ancillary technologies such as energy storage/harvesting, communications protocols, mobility concepts, and plug-andplay sensor and communications standards  ... 
doi:10.1038/428892a pmid:15118700 fatcat:4l7opgcfbzdm7merk5sw35a3ry

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

Ding Wang, Ping Wang
2014 Computer Networks  
Anonymity is among the important properties of two-factor authentication schemes for wireless sensor networks (WSNs) to preserve user privacy.  ...  Remarkably, our principle can be applied to two-factor schemes for universal environments besides WSNs, such as the Internet, global mobility networks and mobile clouds.  ...  , global mobility networks, proxy mobile IPv6 networks, satellite networks, mobile clouds and other wireless environments.  ... 
doi:10.1016/j.comnet.2014.07.010 fatcat:bnjs3othbvc2rgaqwmeo3nwfka

Enhanced Key Management Protocols for Wireless Sensor Networks

Baojiang Cui, Ziyue Wang, Bing Zhao, Xiaobing Liang, Yuemin Ding
2015 Mobile Information Systems  
With rapid development and extensive use of wireless sensor networks (WSNs), it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks  ...  The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing.  ...  Mobile Information Systems (ii) The sensor network is static (sensor nodes are not mobile) after deployment. (iii) Sensor nodes have similar computational and communication capabilities.  ... 
doi:10.1155/2015/627548 fatcat:qlab7pwsjjhovnjrrplojcguhi
« Previous Showing results 1 — 15 out of 127 results