Lightweight authentication protocol used in wireless sensor network

Lightweight authentication protocol used in wireless sensor network CRT (Chinese remainder Theorem Algorithm) implementation in NS2 TCL script Indoor positioning system is implemented using sensors that use Wi-Fi triangulation to compute the position of a mobile device in a given area. This group of sensors placed in an unattended environment form a Wireless Sensor Network (WSN). These nodes in WSN are more vulnerable to passive and active attacks than wired sensors due to limitations in resources, unrestrained environments and their broadcasting nature. Security will be a significant factor in such…

Read More

Time-Delayed Broadcasting for Defeating Inside Jammers

Time-Delayed Broadcasting for Defeating Inside Jammers Jamming-resistant broadcast communications under an internal threat model is proposed. A timedelayed broadcast scheme (TDBS) is proposed, which implements the broadcast operation as a series of unicast transmissions distributed in frequency and time. TDBS does not rely on commonly shared secrets, or the existence of jamming-immune control channels for coordinating broadcasts. Instead, each node follows a unique pseudo-noise (PN) frequency hopping sequence. Contrary to conventional PN sequences designed for multi-access systems, the PN sequences in TDBS exhibit correlation to enable broadcast. Moreover, they are…

Read More

An Efficient Distributed Trust Model for Wireless Sensor Networks

An Efficient Distributed Trust Model for Wireless Sensor Networks Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research works only take communication behavior into account to calculate sensor nodes’ trust value, which is not enough for trust evaluation due to the widespread malicious attacks. An Efficient Distributed Trust Model (EDTM) is proposed for WSNs. First, according to the number of packets received by sensor nodes, direct trust and recommendation trust are…

Read More

Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System

Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System Real-time path planning can efficiently relieve traffic congestion in urban scenarios. However, how to design an efficient path planning algorithm to achieve a globally optimal vehicle traffic control still remains a challenging problem, especially when we take drivers’ individual preferences into consideration. A hybrid intelligent transportation system (ITS) is established, i.e., a hybrid VANET enhanced ITS, which utilizes both vehicular adhoc networks (VANETs) and cellular systems of the public transportation system to enable real-time…

Read More

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. However such aggregation is known to be highly vulnerable to node compromising attacks. Since WSN are usually unattended and without tamper resistant hardware, they are highly susceptible to such attacks. Thus, ascertaining trustworthiness of data and reputation of sensor nodes is crucial for WSN. As the performance…

Read More

A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks

A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks Security and energy efficiency are critical concerns in wireless sensor network (WSN) design. An energy-efficient secure scheme against power exhausting attacks is developed, especially the denial-of-sleep attacks, which can shorten the lifetime of WSNs rapidly. Although various media access control (MAC) protocols have been proposed to save the power and extend the lifetime of WSNs, the existing designs of MAC protocol are insufficient to protect the WSNs from denial of- sleep attacks in MAC layer. This is attributed…

Read More

Effective Key Management in Dynamic Wireless Sensor Networks

Effective Key Management in Dynamic Wireless Sensor Networks Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traffic flow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. A certificateless-effective key management (CL-EKM) protocol is proposed for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports efficient key updates when a node leaves or joins a cluster and ensures forward and backward key secrecy. The…

Read More

Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

Wormhole Attack Detection Algorithms in Wireless Network Coding Systems Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that of wormhole attacks, which undermines the performance gain of network coding. Since the underlying characteristics of network coding systems are distinctly different from traditional wireless networks, the impact of wormhole attacks and countermeasures are generally unknown. It is quantified Wormholes’ devastating harmful impact on…

Read More

Neighbor Discovery in Wireless Networks with Multipacket Reception

Neighbor Discovery in Wireless Networks with Multipacket Reception Neighbor discovery is one of the first steps in configuring and managing a wireless network. Most existing studies on neighbor discovery assume a single-packet reception model where only a single packet can be received successfully at a receiver. Neighbor discovery in MPR networks is studied that allow packets from multiple simultaneous transmitters to be received successfully at a receiver. Starting with a clique of n nodes, a simple Aloha-like algorithm is analyzed and show that it takes time to discover all neighbors…

Read More

VGDRA: A virtual grid-based dynamic routes adjustment scheme for mobile sink-based WSN

VGDRA: A virtual grid-based dynamic routes adjustment scheme for mobile sink-based wsn Exploiting the sink mobility in wireless sensor networks has been considered as a good strategy to balance the nodes energy dissipation. Despite its numerous advantages, the data dissemination to the mobile sink is a challenging task for the resource constrained sensor nodes due to the dynamic network topology caused by the sink mobility. For efficient data delivery, nodes need to reconstruct their routes toward the latest location of the mobile sink, which undermines the energy conservation goal. A…

Read More