192 Hits in 5.8 sec

Dynamic key management in wireless sensor networks: A survey

Xiaobing He, Michael Niedermeier, Hermann de Meer
2013 Journal of Network and Computer Applications  
Wireless sensor networks (WSNs) have a vast field of applications, including environment monitoring, battlefield surveillance and target tracking systems.  ...  This paper investigates the special requirements of dynamic key management in sensor network environments, and introduces several basic evaluation metrics.  ...  EBS-based key update schemes The Exclusion Basis System (EBS) [40] is a combinatorial formulation of the group key management problem in wireless sensor networks.  ... 
doi:10.1016/j.jnca.2012.12.010 fatcat:cdj363o7cbb2xnkorlncxwkk7y

A Survey On Security In Wireless Sensor Network

Faris Fazlic, Seyed Ali Hashemi, Ahmed Aletic, Ali Abd Almisreb, Syamimi Mohd Norzeli, Norashidah Md Din
2019 Southeast Europe Journal of Soft Computing  
In this paper we present a survey of security issues in WSNs, address the state of the art in research on sensor network security, and discuss some future directions for research.  ...  Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs).  ...  Group Key Distribution Wireless sensor networks are inherently collaborative environments in which sensor nodes often communicate in groups that typically are dynamic.  ... 
doi:10.21533/scjournal.v8i1.174 fatcat:5qi4jzi6g5cfldjyuhyf2qku7u

Cluster Based Key Management Schemes in Wireless Sensor Networks: A Survey

Siron Anita Susan T, B. Nithya
2020 Procedia Computer Science  
Wireless Sensor Network(WSN) consists of huge number of sensor nodes which has the capability of sensing physical phenomenon around them.  ...  Abstract Wireless Sensor Network(WSN) consists of huge number of sensor nodes which has the capability of sensing physical phenomenon around them.  ...  However, cluster based KMS classification is not surveyed. So, this paper aims to give the details about KMS schemes that have been used in cluster based wireless sensor network.  ... 
doi:10.1016/j.procs.2020.04.291 fatcat:etgucb5o7bbdzlhstdq7zjleya

A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks

A P Thangamuthu
2021 Shanlax International Journal of Arts, Science and Humanities  
The compulsion of security issues occurs in the Wireless Sensor Network to be accepted with complete zip honesty, confidentiality, authentication during contact.  ...  In this paper, we analyze the security criteria, internal and external security threats and attacks that can be done, and the mechanism used in the Wireless Sensor Network to address such security issues  ...  ., a group key) from wireless nodes, which are used to protect communications in most wireless networks.  ... 
doi:10.34293/sijash.v9i2.4159 fatcat:5fp6j2mjzzh5rdwslzs2irckc4

Sensor network security: a survey

Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou
2009 IEEE Communications Surveys and Tutorials  
As sensor networks become wide-spread, security issues become a central concern, especially in mission-critical tasks.  ...  Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications.  ...  In this paper, we present a nearly comprehensive survey of security researches in wireless sensor networks, which has been presented in the literature.  ... 
doi:10.1109/surv.2009.090205 fatcat:qcm4ieoqwrdl7ezxffdsdfyk3e

Securing Wireless Sensor Networks: A Survey

Said Ould Amara, Rachid Beghdad, Mourad Oussalah
2013 EDPACS: The EDP Audit, Control, and Security Newsletter  
A Group Key pre-distributed and shared among all nodes in the network and the base station uses this key to provide security of broadcast messages sent to the whole group.  ...  ATTACKS IN WIRELESS SENSOR NETWORKS For securing WSNs, it is necessary to address the attacks and then take countermeasures in order to face these attacks.  ... 
doi:10.1080/07366981.2013.754207 fatcat:sbgmi6vpkvhineeobep3jb3qte

A Survey on M2M Service Networks

Juhani Latvakoski, Antti Iivari, Paul Vitic, Bashar Jubeh, Mahdi Alaya, Thierry Monteil, Yoann Lopez, Guillermo Talavera, Javier Gonzalez, Niclas Granqvist, Monir Kellil, Herve Ganem (+1 others)
2014 Computers  
Solutions for wireless sensors networks in some specific domain and application have been developed [36] .  ...  M2M communication infrastructure contains heterogeneous networks including local M2M asset network (M2M capillary network) such as personal/body area network, vehicular network and wireless sensor network  ...  Acknowledgments This review is related to deliverables of ITEA2 A2Nets project dealing with autonomic M2M service networks.  ... 
doi:10.3390/computers3040130 fatcat:74vq35r6jjd27oubdpze7ef4e4

A survey of key management in ad hoc networks

Anne Marie Hegland, Eli Winjum, Stig F. Mjolsnes, Chunming Rong, Oivind Kure, Pal Spilling
2006 IEEE Communications Surveys and Tutorials  
This article surveys the state of the art within key management for ad hoc networks, and analyzes their applicability for network-layer security.  ...  The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts.  ...  We also thank Leif Nilsen of the Univeristy of Oslo's University Graduate Centre/Thales Group Norway for valuable discussions and comments on our work. A special thanks to Prof.  ... 
doi:10.1109/comst.2006.253271 fatcat:zaobvvfiqzc2jovl7rozpplhxa

A Survey on Security Techniques in Group Communication for Wireless Sensor Networks

H SAnnapurna, M. Siddappa
2015 International Journal of Computer Applications  
In a wireless sensor network, the commununication takes place by group based, where sensor nodes are deployed in groups and each group performs communication using keys.  ...  Wireless Network is studied in research with respect to wireless LAN (Local Area Network), wireless mesh network, wireless sensor network, mobile adhoc network, etc.  ...  The methods permit multiple logical groups; every group is maintained and rekeyed disjointedly by a resourceconstrained sensor node without requiring much multicast routing.  ... 
doi:10.5120/19836-1689 fatcat:hvikcx5vcfdbnbbumido2b3gvi

A survey of security issues in mobile ad hoc and sensor networks

D. Djenouri, L. Khelladi, A.N. Badache
2005 IEEE Communications Surveys and Tutorials  
This survey also includes an overview of security in a particular type of MANET, namely, wireless sensor networks (WSNs).  ...  Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence  ...  Abdelmadjid Bouabdallah for his advice, support, and reception at Heudiasyc Lab of Compiegne University, where we prepared the first version of this survey.  ... 
doi:10.1109/comst.2005.1593277 fatcat:rs4nd35to5g63fzvplgg75ftu4

A survey of key management schemes in wireless sensor networks

Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, Michael Galloway
2007 Computer Communications  
In this paper, we provide a survey of key management schemes in wireless sensor networks.  ...  Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas.  ...  In most wireless sensor networks, the many-to-one traffic pattern dominates, where a large number of sensors send data to one (or a few) sink.  ... 
doi:10.1016/j.comcom.2007.04.009 fatcat:h4dpize62nbkhpbnziusau4l4e

A survey of intrusion detection in wireless network applications

Robert Mitchell, Ing-Ray Chen
2014 Computer Communications  
In order to identify gaps and propose research directions in wireless network intrusion detection research, we survey the literature of this area.  ...  local area networks (WLANs), wireless personal area networks (WPANs), wireless sensor networks (WSNs), ad hoc networks, mobile telephony, wireless mesh networks (WMNs) and cyber physical systems (CPSs  ...  WISN Wireless industrial sensor network WLAN Wireless local area network WMN Wireless mesh network WPAN Wireless personal area network WSN Wireless sensor network 1-23 1.  ... 
doi:10.1016/j.comcom.2014.01.012 fatcat:24cujhgddrfppnbrtqy4u7xvm4

On Securing Underwater Acoustic Networks: A Survey

Shengming Jiang
2018 IEEE Communications Surveys and Tutorials  
This paper aims to provide a comprehensive survey on UWAN security by first discussing the fundamental of network security in general and the main UWAN security threats faced by the physical layer to the  ...  Index Terms-Underwater acoustic network (UWAN), network security, security threat, security measure, security structure. 1553-877X His research interest includes networking issues in both wired and wireless  ...  ) and wireless sensor networks (WSNs).  ... 
doi:10.1109/comst.2018.2864127 fatcat:7b5wufjqmvcnje7pcmxrdf6ehi

A survey of security issues in wireless sensor networks

Yong Wang, Garhan Attebury, Byrav Ramamurthy
2006 IEEE Communications Surveys and Tutorials  
The differences between sensor networks and ad hoc networks are [4]: • The number of sensor nodes in a sensor network can be several orders of magnitude higher than the nodes in an ad hoc network. • Sensor  ...  These constraints make security in WSNs a challenge. In this article we present a survey of security issues in WSNs.  ...  While existing surveys [12] [13] [14] [15] discuss security in wireless networks, none focus specifically on security in WSNs and the constraints unique to them.  ... 
doi:10.1109/comst.2006.315852 fatcat:sfaux6aqxjf4jhuasgozm3a7su

Cryptographic Key Management in Delay Tolerant Networks: A Survey

Sofia Anna Menesidou, Vasilios Katos, Georgios Kambourakis
2017 Future Internet  
Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a) security initialization, (b) key establishment  ...  To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment  ...  In [31] the authors describe a Distributed Key Establishment (DKE) protocol in location-based social wireless sensor and actor DTNs.  ... 
doi:10.3390/fi9030026 fatcat:fmacr4hrjrd27efi677m7cja7m
« Previous Showing results 1 — 15 out of 192 results