Filters








1,337 Hits in 6.8 sec

Energy Efficient Error Detection in Data Aggregation in WSN
english

Lithiya Sara Babu, N.Uma Maheswari
2014 International Journal of Innovative Research in Science Engineering and Technology  
Wireless sensor networks are vulnerable to many types of security attacks, including data forgery, false data injection and eavesdropping.  ...  False data can be injected by compromised sensor nodes in various ways, including data aggregation and relay. In WSNs, data aggregation is performed by sensor nodes, called data aggregators.  ...  Key inheritance-based Filtering Scheme: It prevents forwarding of false reports, the keys of each node used in the message authentication consist of its own key and the keys inherited from its upstream  ... 
doi:10.15680/ijirset.2014.0311045 fatcat:3ghaemii2bhhfhffs3266wwwzy

Challenges For Security In Wireless Sensor Networks (Wsns)

Muazzam A. Khan, Ghalib A. Shah, Muhammad Sher
2011 Zenodo  
Still, more work needs to be done.In this paper we provide a detailed discussion on security in wireless sensor networks.  ...  Wireless sensor network is formed with the combination of sensor nodes and sink nodes. Recently Wireless sensor network has attracted attention of the research community.  ...  The proposed scheme is totally based on Blom's key pre distribution scheme which allows any pair of nodes in the network to find a pair wise secret key.  ... 
doi:10.5281/zenodo.1334422 fatcat:gpfyqq545beerkx4qorv7v4w54

LEDS - An innovative corridor of data security in WSN

Chetana V.
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
Nearby many techniques have been proposed in the literature for data security.  ...  Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security.  ...  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, 2004 S. Zhu, S. Setia, S. Jajodia, and P.  ... 
doi:10.17762/ijritcc2321-8169.150258 fatcat:alymwfm3lna4fmf7jjuipgayfm

Time-Based DynamiC Keying and En-Route Filtering (TICK) for Wireless Sensor Networks

A. Selcuk Uluagac, Raheem A. Beyah, John A. Copeland
2010 2010 IEEE Global Telecommunications Conference GLOBECOM 2010  
Given that transmission cost is significant in a Wireless Sensor Network (WSN), sending explicit keying control messages significantly increases the amount of energy consumed by each sensing device.  ...  Our protocol, the TIme-Based DynamiC Keying and En-Route Filtering (TICK) protocol for WSNs secures events as they occur.  ...  Although the authors suggest the use of bloom-filters to decrease the MAC overhead, SEF is a static key-based scheme and it inherits all the downsides of static key management schemes [8] .  ... 
doi:10.1109/glocom.2010.5683787 dblp:conf/globecom/UluagacBC10 fatcat:h2tgsispjfcr3n4ldoxluwuq5u

A Security Method for Multiple Attacks in Sensor Networks: Against False-Report Injection, False-Vote Injection and Wormhole Attacks

Su Man Nam, Tae Ho Cho
2014 Informatics Engineering an International Journal  
In a large-scale wireless sensor network, damage spreads rapidly in the network when under false report injection, false votes injection, or wormhole attacks.  ...  A probabilistic voting-based filtering scheme (PVFS) and localized encryption and authentication protocol (LEAP) can be used to cope with these attacks.  ...  interleaved hop-by-hop authentication scheme (IHA) [6] , and the key inheritance-based filtering scheme (KIF) [16] .  ... 
doi:10.5121/ieij.2014.2402 fatcat:rufh2ox4h5at3mg5ln7qlizkwy

VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks

A Selcuk Uluagac, Raheem A Beyah, Yingshu Li, John A Copeland
2010 IEEE Transactions on Mobile Computing  
VEBEK is able to efficiently detect and filter false data injected into the network by malicious outsiders.  ...  Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices.  ...  Although the authors suggest the use of bloom-filters to decrease the MAC overhead, SEF is a static key-based scheme and it inherits all the downsides of static key management schemes.  ... 
doi:10.1109/tmc.2010.51 fatcat:qrc7s77ghbg25anomxmmj4pzza

Advanced Redundancy Management Of Heterogeneous Using The Packet Dropper With Nodes For Multipath routing

Angelin P Edwin
2014 IOSR Journal of Computer Engineering  
Developing a secured environment for detectingmalicious nodes in a heterogeneous wireless sensor network(HWSN).Here which is analysing the best redundancylevel using path redundancy and sourceredundancy.Packet  ...  to identify packet modifiers with a certain probability.In wireless sensor networks(WSN),a critical issue is that security of the data transmission.For the system performance of a WSN,clustering ia an  ...  nested marking(PNM) scheme to identify packet modifiers with a certain probability.However,the PNM scheme cannot be used together with the false packet filtering schemes,because the filtering schemes  ... 
doi:10.9790/0661-162100107 fatcat:zjgp7xkwvzchhdn7xyo5amk5ni

Energy Efficient Fuzzy Adaptive Verification Node Selection-Based Path Determination in Wireless Sensor Networks

Muhammad Akram, Tae Cho
2017 Symmetry  
As a defense against FRIA, various solutions, such as location based resilient security (LBRS) [19] , the statistical en-route filtering scheme (SEF) [5], the key inheritance-based filtering scheme (KIF  ...  The scheme helps delay the emergence of hotspot problems near the base station and exhibits improved energy conserving behavior in wireless sensor networks.  ...  System Model and Assumptions We study a large-scale wireless sensor network whose nodes are densely deployed and organized in a cluster-based topology.  ... 
doi:10.3390/sym9100220 fatcat:2qh2ujpn7vaa3b4s6cvr56wute

A Study of Various Spoofing Attacks and Attackers in Wireless Networks

Miss Shweta, Prof Bhavana S, Prof Shailaja Shastri
2014 IOSR Journal of Computer Engineering  
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks.  ...  We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks.  ...  provide strong evidence of high accuracy of localizing multiple adversaries.  The Cluster Based wireless Sensor Network data received signal strength (RSS) based spatial correlation of network Strategy  ... 
doi:10.9790/0661-16356165 fatcat:wgaw3ad555d5hiyydxuggq3mam

Smart community: an internet of things application

Xu Li, Rongxing Lu, Xiaohui Liang, Xuemin Shen, Jiming Chen, Xiaodong Lin
2011 IEEE Communications Magazine  
In this article, we introduce an Internet of Things application, smart community, which refers to a paradigmatic class of cyber-physical systems with cooperating objects (i.e., networked smart homes).  ...  We then define the smart community architecture, and describe how to realize secure and robust networking among individual homes.  ...  for filtering false data traffic in community network [8] .  ... 
doi:10.1109/mcom.2011.6069711 fatcat:v2hx4podindtvloiuzr5m3fogm

Trust Based Approaches of Intrusion Detection Architecture for Wireless Sensor Networks: A Survey

Jeelani ., Manoj Rana, Aasim Zafar
2018 IJARCCE  
Wireless Sensor Networks (WSNs) consists of tiny sensor nodes deployed in various geographic conditions to gather the information about the environment.  ...  In this article, our focal point of consideration is on Intrusion Detection Architecture for Wireless Sensor Networks.  ...  In order to filter out compromised nodes from sensor networks, some trust-based systems have recently been modeled for Wireless Sensor Networks, which further needs to be strengthened in terms of security  ... 
doi:10.17148/ijarcce.2018.71024 fatcat:3qezkgmkyjbtjms6ecmnqeyp5q

An Innovative Approach of Blending Security Features in Energy-Efficient Routing for a Crowded Network of Wireless Sensors [chapter]

Al-Sakib Pathan, Tarem Ahmed
2013 The State of the Art in Intrusion Prevention and Detection  
Motivated by [8] , Lee and Cho [9] propose an enhanced interleaved authentication scheme called the key inheritance-based filtering that prevents forwarding of false reports.  ...  In their scheme, the keys of each node used in the message authentication consist of the node's own key and the keys inherited from its upstream nodes.  ...  In this case, the base station periodically broadcasts a new session key to the sensors in the network.  ... 
doi:10.1201/b16390-24 fatcat:54jvvumgorcifj3nhdl4uowfum

An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures

Rehana Yasmin, Eike Ritter, Guilin Wang
2010 2010 10th IEEE International Conference on Computer and Information Technology  
Resource constraints of sensor nodes are hurdles in applying strong public key cryptographic based mechanisms in WSNs.  ...  Resource constraints of sensor nodes are hurdles in applying strong public key cryptographic based mechanisms in WSNs.  ...  ACKNOWLEDGMENT This work has been partially supported by the EPSRC project Verifying Interoperability Requirements in Pervasive Systems (EP/F033540/1).  ... 
doi:10.1109/cit.2010.165 dblp:conf/IEEEcit/YasminRW10 fatcat:gzagy4yj6bdofdm4l7yx3dinf4

Gafs: Genetic Algorithm-Based Filtering Scheme For Improving Detection Power In Sensor Networks

Tae Ho Cho, Su Man Nam, Muhammad K. Shahzad
2017 Zenodo  
Wireless sensor networks (WSNs) have stringent energy and computational requirements.  ...  A probabilistic votingbased filtering scheme (PVFS) uses probabilistic filtering based on the distance to counter attacks of fabricated reports with false votes and real reports with false votes.  ...  [25] proposed key inheritance-based filtering (KIF), which prevents forwarding of false reports to subsequent nodes.  ... 
doi:10.5281/zenodo.848950 fatcat:hg47cqbnorh3zp7q3v6aiovy7q

GAFS: GENETIC ALGORITHM-BASED FILTERING SCHEME FOR IMPROVING DETECTION POWER IN SENSOR NETWORKS

Tae Ho Cho, Su Man Nam, Shahzad Muhammad K.
2015 International journal of research - granthaalayah  
Wireless sensor networks (WSNs) have stringent energy and computational requirements.  ...  A probabilistic voting-based filtering scheme (PVFS) uses probabilistic filtering based on the distance to counter attacks of fabricated reports with false votes and real reports with false votes.  ...  [25] proposed key inheritance-based filtering (KIF), which prevents forwarding of false reports to subsequent nodes.  ... 
doi:10.29121/granthaalayah.v3.i12.2015.2894 fatcat:gvklyno7ubbk3bkuubokmdmhie
« Previous Showing results 1 — 15 out of 1,337 results