32,996 Hits in 6.4 sec

Address Internetworking between WSNs and Internet supporting Web Services

Jeong-Hee Kim, Do-Hyeon Kim, Ho-Young Kwak, Yung-Cheol Byun
2007 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07)  
There have been an increasing interest for wireless sensor networks as a new technology to realize the ubiquitous computing, and demands for internetworking technology between the wireless sensor networks  ...  For this purpose, this paper proposes the internetworking scheme which allocating IP addresses to sensor node and internetworking based on the gateway-based integration for internetworking between the  ...  The Scheme of the IP address assignment This is the scheme for saving the assignment information when assign the IP address to ZigBee ID which has assigned to the sensor node in wireless sensor networks  ... 
doi:10.1109/mue.2007.63 dblp:conf/mue/KimKKB07 fatcat:n7linjiebvdttd43giusyw72me

A New Security Scheme for Wireless Sensor Networks

Junqi Zhang, Vajay Varadharajan
2008 IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference  
In this paper, we present a new wireless sensor network security scheme. Our scheme is based on LOCK scheme and employees ID-based secure group key management.  ...  In this paper, we propose a new wireless sensor network security scheme based on LOCK. We employ the same network model as LOCK. However, we use a new ID-based encryption algorithm.  ...  Key Generation and Assignment For the lower layer, our scheme still employs the same key generation and assignment method as the LOCK.  ... 
doi:10.1109/glocom.2008.ecp.32 dblp:conf/globecom/ZhangV08 fatcat:zxgjkthtuvht3hxb32rqgglvu4

A Novel Overlay IDS For Wireless Sensor Networks [article]

Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen, Mohammad Saiful Islam Mamun
2012 arXiv   pre-print
Wireless Sensor Network (WSN) consists of low cost sensor nodes which cannot afford to implement sophisticated security system in it.  ...  We propose a novel architecture for Intrusion Detection System (IDS) in WSN based on Hierarchical Overlay Design (HOD) that will distribute the overall responsibility of intrusion detection into entities  ...  for IDS (Krishnan M. 2006) Steps to build an IDS using centralized routing method (Strikos.  ... 
arXiv:1208.3771v1 fatcat:2fmmcdwr3vffbkr5zb3itjcqke

A Clustering Protocol with Mode Selection for Wireless Sensor Network

Aries Kusdaryono, Kyung-Oh Lee
2011 Journal of Information Processing Systems  
It can improve the scalability and lifetime of wireless sensor networks. In this paper, we introduce a clustering protocol with mode selection (CPMS) for wireless sensor networks.  ...  Wireless sensor networks are composed of a large number of sensor nodes with limited energy resources.  ...  regular nodes Each node is assigned identification for a specific time slot sent by the base station -ID of time slot.  ... 
doi:10.3745/jips.2011.7.1.029 fatcat:htgwvjky35eihbdav54brnfrju

Network Based Intrusion Detection And Prevention Systems In Ip-Level Security Protocols

R. Kabila
2008 Zenodo  
We propose the design and implementation of controlled Internet security system, which is IPsec-based Internet information security system in IPv4/IPv6 network and also we show the data of performance  ...  It is also working on lightweight key exchange protocol and MIB's for security management.  ...  Two main IDS systems are Network-Based IDS Systems and Host-Based IDS Systems. Most commercial IDS systems are Network-Based IDS Systems.  ... 
doi:10.5281/zenodo.1083488 fatcat:dwj7ivpjwvbshltwqaicf4mdfa

Traffic-Aware Channel Assignment in Wireless Sensor Networks [chapter]

Yafeng Wu, Matthew Keally, Gang Zhou, Weizhen Mao
2009 Lecture Notes in Computer Science  
Existing frequency assignment efforts in wireless sensor network research focus on balancing available physical frequencies among neighboring nodes, without paying attention to the fact that different  ...  We incorporate our traffic-aware frequency assignment design into an existing multi-channel MAC, and compare the performance with two conventional frequency assignment schemes.  ...  Users can select any of these methods to evenly assign different channels among twohop neighbors. TMCP [16] proposes a tree-based channel assignment scheme.  ... 
doi:10.1007/978-3-642-03417-6_47 fatcat:ncwscdkyungche6kyg3py7zqlu

An Experimental Simulation of Addressing Auto-Configuration Issues for Wireless Sensor Networks

Idrees Sarhan Kocher
2022 Computers Materials & Continua  
The approach of using a unique address isn't preferable for most Wireless Sensor Networks (WSNs) applications as well.  ...  First, name/address solutions that assign unique addresses locally to clustered topology-based sensor devices, reutilized in a spatial manner, and reduce name/address size by a noticeable amount of 2.9  ...  Funding Statement: The author received no specific funding for this study.  ... 
doi:10.32604/cmc.2022.023478 fatcat:nqffjmxhsbgn7bl25x7sq4xyxa

A location-based naming mechanism for securing sensor networks

Yun Zhou, Yuguang Fang
2006 Wireless Communications and Mobile Computing  
This paper introduces the naming problem for sensor networks in the literature for the first time, and proposes a location-based naming mechanism (LBN) for sensor networks, in which location information  ...  When LBN is enforced, the impacts of many attacks to sensor network topology can be limited in a small area.  ...  However, in current link layer protocols for sensor networks, the node ID field length is usually less than 4 bytes.  ... 
doi:10.1002/wcm.400 fatcat:obb6qwtdd5azjezps6iz4ewcmu

Examination of Different Intrusion Detection System in Wireless Sensor Network Environment

2019 International journal of recent technology and engineering  
Then, the survey reviews the related work on Cross-layer IDS and the applicability of those systems to WSNs. Then a brief survey is presented for Dynamic IDS.  ...  This is followed by trust-based IDS in WSN. Then, the survey reviews the related work on hybrid IDS in WSN. Finally, the survey for different ids in WSNs is analyzed.  ...  Network-Based IDS: It has a network sensor with a Network Interface Card (NIC). Network-based IDS operate on the network level and analyze the network traffic.  ... 
doi:10.35940/ijrte.d1122.1284s219 fatcat:dgladfogrzgyhnh72kss4nkdqm

Lightweight Management of Resource-Constrained Sensor Devices in Internet of Things

Zhengguo Sheng, Hao Wang, Changchuan Yin, Xiping Hu, Shusen Yang, Victor C. M. Leung
2015 IEEE Internet of Things Journal  
Specifically, motivated by the recent development of IPv6 based open standards for accessing wireless resource constrained networks, we consider to implement 6LoWPAN/RPL/CoAP protocols on sensor devices  ...  and propose a CoAP based device management solution to allow easy access and management of IPv6 sensor devices.  ...  CoAP-based management protocol The proposed device management protocol is fully based on IETF defined CoAP protocol with newly defined resource 5 The CoAP server may assign different method IDs to a  ... 
doi:10.1109/jiot.2015.2419740 fatcat:u2hlad2t4ra6dluak2o3j24wji

Green Communication for Underwater Wireless Sensor Networks: Triangle Metric Based Multi-Layered Routing Protocol

Ahmad M. Khasawneh, Omprakash Kaiwartya, Jaime Lloret, Hayfa Y. Abuaddous, Laith Abualigah, Mohammad Al Shinwan, Mahmoud Ahmad Al-Khasawneh, Marwan Mahmoud, Rupak Kharel
2020 Sensors  
In this paper, we propose a non-localization routing protocol for underwater wireless sensor networks (UWSNs), namely, the triangle metric based multi-layered routing protocol (TM2RP).  ...  The obtained results were compared to other similar methods such as depth based routing (DBR) and multi-layered routing protocol (MRP).  ...  The authors, therefore, gratefully acknowledge DSR for the technical and financial support. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s20247278 pmid:33353003 fatcat:lmg6nvj72ram7cy54iuztmliwu

Intrusion Detection System in Wireless Sensor Networks by using Lesser Algorithm

Finally, the current article explains the implementation of the lower algorithm in sensor networks for evaluating the network intrusion detection system.  ...  Over the last few years, researchers have developed different distributed and centralized intrusion detection systems for wireless sensor networks but not reached to a higher performance level.  ...  Only few studies are available in this field to develop a trust-based IDS protocol layer, to the best of our knowledge.  ... 
doi:10.35940/ijitee.f3349.049620 fatcat:c3qghuo6jvdijhf4rgfdrgsj5i

An Efficient Authentication and Access Control Scheme for Perception Layer of Internet of Things

Ning YE, Yan Zhu, Ru-chuan WANG, Reza Malekian, Lin Qiao-min
2014 Applied Mathematics & Information Sciences  
In this paper, we proposed an efficient authentication and access control method based on general view of the security issues for perception layer of Internet of Things (IoT).  ...  The advantage of the proposed method is establishing session key based on Elliptic Curve Cryptography (ECC).  ...  [11] applied an ECC-based wireless sensor network access control scheme which is a prospective method based on public key cryptography.  ... 
doi:10.12785/amis/080416 fatcat:qihlqoqjrff4fgbafvoqs7yaii

Secure and Authenticated Naming Scheme for IoT Devices in Heterogeneous Networks

Monitoring of the node in the network is implemented using IP based Position monitoring and Intruder Detection system (IDS) is implemented for detecting the attacks.  ...  Hence, this paper proposes an efficient and secure distributed naming scheme for IoT in heterogeneous network.  ...  In section III, a Naming Service Scheme is proposed effectively for the Wireless Sensor Network with IPv6 based network. III.  ... 
doi:10.35940/ijitee.j9989.0881019 fatcat:z634564h4vatfbll4hcxc2vj7q

A Survey on Scheduling Algorithms for Wireless Sensor Networks

Sumit Kumar, Siddhartha Chauhan
2011 International Journal of Computer Applications  
Various scheduling method for TDMA protocol with different objective have been proposed for wireless sensor networks.  ...  Designing of MAC layer protocol for wireless sensor network is a challenging task due to limited battery power and limited bandwidth.  ...  Although there are various TDMA based MAC layer protocols proposed for sensor networks, there is no protocol accepted as a standard.  ... 
doi:10.5120/2432-3271 fatcat:skctlnposzbehfa2u6rv2p5rza
« Previous Showing results 1 — 15 out of 32,996 results