A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Address Internetworking between WSNs and Internet supporting Web Services
2007
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07)
There have been an increasing interest for wireless sensor networks as a new technology to realize the ubiquitous computing, and demands for internetworking technology between the wireless sensor networks ...
For this purpose, this paper proposes the internetworking scheme which allocating IP addresses to sensor node and internetworking based on the gateway-based integration for internetworking between the ...
The Scheme of the IP address assignment This is the scheme for saving the assignment information when assign the IP address to ZigBee ID which has assigned to the sensor node in wireless sensor networks ...
doi:10.1109/mue.2007.63
dblp:conf/mue/KimKKB07
fatcat:n7linjiebvdttd43giusyw72me
A New Security Scheme for Wireless Sensor Networks
2008
IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
In this paper, we present a new wireless sensor network security scheme. Our scheme is based on LOCK scheme and employees ID-based secure group key management. ...
In this paper, we propose a new wireless sensor network security scheme based on LOCK. We employ the same network model as LOCK. However, we use a new ID-based encryption algorithm. ...
Key Generation and Assignment For the lower layer, our scheme still employs the same key generation and assignment method as the LOCK. ...
doi:10.1109/glocom.2008.ecp.32
dblp:conf/globecom/ZhangV08
fatcat:zxgjkthtuvht3hxb32rqgglvu4
A Novel Overlay IDS For Wireless Sensor Networks
[article]
2012
arXiv
pre-print
Wireless Sensor Network (WSN) consists of low cost sensor nodes which cannot afford to implement sophisticated security system in it. ...
We propose a novel architecture for Intrusion Detection System (IDS) in WSN based on Hierarchical Overlay Design (HOD) that will distribute the overall responsibility of intrusion detection into entities ...
for IDS (Krishnan M. 2006) Steps to build an IDS using centralized routing method (Strikos. ...
arXiv:1208.3771v1
fatcat:2fmmcdwr3vffbkr5zb3itjcqke
A Clustering Protocol with Mode Selection for Wireless Sensor Network
2011
Journal of Information Processing Systems
It can improve the scalability and lifetime of wireless sensor networks. In this paper, we introduce a clustering protocol with mode selection (CPMS) for wireless sensor networks. ...
Wireless sensor networks are composed of a large number of sensor nodes with limited energy resources. ...
regular nodes Each node is assigned identification for a specific time slot sent by the base station -ID of time slot. ...
doi:10.3745/jips.2011.7.1.029
fatcat:htgwvjky35eihbdav54brnfrju
Network Based Intrusion Detection And Prevention Systems In Ip-Level Security Protocols
2008
Zenodo
We propose the design and implementation of controlled Internet security system, which is IPsec-based Internet information security system in IPv4/IPv6 network and also we show the data of performance ...
It is also working on lightweight key exchange protocol and MIB's for security management. ...
Two main IDS systems are Network-Based IDS Systems and Host-Based IDS Systems. Most commercial IDS systems are Network-Based IDS Systems. ...
doi:10.5281/zenodo.1083488
fatcat:dwj7ivpjwvbshltwqaicf4mdfa
Traffic-Aware Channel Assignment in Wireless Sensor Networks
[chapter]
2009
Lecture Notes in Computer Science
Existing frequency assignment efforts in wireless sensor network research focus on balancing available physical frequencies among neighboring nodes, without paying attention to the fact that different ...
We incorporate our traffic-aware frequency assignment design into an existing multi-channel MAC, and compare the performance with two conventional frequency assignment schemes. ...
Users can select any of these methods to evenly assign different channels among twohop neighbors. TMCP [16] proposes a tree-based channel assignment scheme. ...
doi:10.1007/978-3-642-03417-6_47
fatcat:ncwscdkyungche6kyg3py7zqlu
An Experimental Simulation of Addressing Auto-Configuration Issues for Wireless Sensor Networks
2022
Computers Materials & Continua
The approach of using a unique address isn't preferable for most Wireless Sensor Networks (WSNs) applications as well. ...
First, name/address solutions that assign unique addresses locally to clustered topology-based sensor devices, reutilized in a spatial manner, and reduce name/address size by a noticeable amount of 2.9 ...
Funding Statement: The author received no specific funding for this study. ...
doi:10.32604/cmc.2022.023478
fatcat:nqffjmxhsbgn7bl25x7sq4xyxa
A location-based naming mechanism for securing sensor networks
2006
Wireless Communications and Mobile Computing
This paper introduces the naming problem for sensor networks in the literature for the first time, and proposes a location-based naming mechanism (LBN) for sensor networks, in which location information ...
When LBN is enforced, the impacts of many attacks to sensor network topology can be limited in a small area. ...
However, in current link layer protocols for sensor networks, the node ID field length is usually less than 4 bytes. ...
doi:10.1002/wcm.400
fatcat:obb6qwtdd5azjezps6iz4ewcmu
Examination of Different Intrusion Detection System in Wireless Sensor Network Environment
2019
International journal of recent technology and engineering
Then, the survey reviews the related work on Cross-layer IDS and the applicability of those systems to WSNs. Then a brief survey is presented for Dynamic IDS. ...
This is followed by trust-based IDS in WSN. Then, the survey reviews the related work on hybrid IDS in WSN. Finally, the survey for different ids in WSNs is analyzed. ...
Network-Based IDS: It has a network sensor with a Network Interface Card (NIC). Network-based IDS operate on the network level and analyze the network traffic. ...
doi:10.35940/ijrte.d1122.1284s219
fatcat:dgladfogrzgyhnh72kss4nkdqm
Lightweight Management of Resource-Constrained Sensor Devices in Internet of Things
2015
IEEE Internet of Things Journal
Specifically, motivated by the recent development of IPv6 based open standards for accessing wireless resource constrained networks, we consider to implement 6LoWPAN/RPL/CoAP protocols on sensor devices ...
and propose a CoAP based device management solution to allow easy access and management of IPv6 sensor devices. ...
CoAP-based management protocol The proposed device management protocol is fully based on IETF defined CoAP protocol with newly defined resource 5 The CoAP server may assign different method IDs to a ...
doi:10.1109/jiot.2015.2419740
fatcat:u2hlad2t4ra6dluak2o3j24wji
Green Communication for Underwater Wireless Sensor Networks: Triangle Metric Based Multi-Layered Routing Protocol
2020
Sensors
In this paper, we propose a non-localization routing protocol for underwater wireless sensor networks (UWSNs), namely, the triangle metric based multi-layered routing protocol (TM2RP). ...
The obtained results were compared to other similar methods such as depth based routing (DBR) and multi-layered routing protocol (MRP). ...
The authors, therefore, gratefully acknowledge DSR for the technical and financial support.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s20247278
pmid:33353003
fatcat:lmg6nvj72ram7cy54iuztmliwu
Intrusion Detection System in Wireless Sensor Networks by using Lesser Algorithm
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Finally, the current article explains the implementation of the lower algorithm in sensor networks for evaluating the network intrusion detection system. ...
Over the last few years, researchers have developed different distributed and centralized intrusion detection systems for wireless sensor networks but not reached to a higher performance level. ...
Only few studies are available in this field to develop a trust-based IDS protocol layer, to the best of our knowledge. ...
doi:10.35940/ijitee.f3349.049620
fatcat:c3qghuo6jvdijhf4rgfdrgsj5i
An Efficient Authentication and Access Control Scheme for Perception Layer of Internet of Things
2014
Applied Mathematics & Information Sciences
In this paper, we proposed an efficient authentication and access control method based on general view of the security issues for perception layer of Internet of Things (IoT). ...
The advantage of the proposed method is establishing session key based on Elliptic Curve Cryptography (ECC). ...
[11] applied an ECC-based wireless sensor network access control scheme which is a prospective method based on public key cryptography. ...
doi:10.12785/amis/080416
fatcat:qihlqoqjrff4fgbafvoqs7yaii
Secure and Authenticated Naming Scheme for IoT Devices in Heterogeneous Networks
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Monitoring of the node in the network is implemented using IP based Position monitoring and Intruder Detection system (IDS) is implemented for detecting the attacks. ...
Hence, this paper proposes an efficient and secure distributed naming scheme for IoT in heterogeneous network. ...
In section III, a Naming Service Scheme is proposed effectively for the Wireless Sensor Network with IPv6 based network. III. ...
doi:10.35940/ijitee.j9989.0881019
fatcat:z634564h4vatfbll4hcxc2vj7q
A Survey on Scheduling Algorithms for Wireless Sensor Networks
2011
International Journal of Computer Applications
Various scheduling method for TDMA protocol with different objective have been proposed for wireless sensor networks. ...
Designing of MAC layer protocol for wireless sensor network is a challenging task due to limited battery power and limited bandwidth. ...
Although there are various TDMA based MAC layer protocols proposed for sensor networks, there is no protocol accepted as a standard. ...
doi:10.5120/2432-3271
fatcat:skctlnposzbehfa2u6rv2p5rza
« Previous
Showing results 1 — 15 out of 32,996 results