The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks (WSNs) are often deployed in hostile environments for specific applications from mobile objects monitoring to data collecting. By eavesdropping the sensor nodes' transmissions and tracing the packets' trajectories in the WSNs, an adversary can capture the location of a source or sink eventually. Thus, the location privacy of both source and sink becomes a significant issue...
The paper deals with security implementation in remote unattended sites which employ sensor systems using versatile communication methods. The principles of security management are outlined. Then, the paper discusses some improvements in the methods for transmission of collected data and images in such areas to the remote monitoring site through wireless communication. Herein, data transmission without...
With the rapid development of computer communication and web technology, especially the widely application of wireless sensor and embedded technology, Wireless Sensor Networks (WSNs) have been paid great attention in industry field and our daily life. WSNs based on ARM7TDMI-S CPU and ZigBee device has merit of rapid and simple in networking, node movable in application, abundant information in acquisition,...
Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not require centralisation. Nodes can locally determine their locations through received signal strength variations and inform neighbours about location updates accordingly. In position verification, network nodes verify the position of each node and...
Certain popular wireless sensor network applications, including disaster recovery, battlefield communication and athlete monitoring, are characterized by extensive node mobility, intermittent contact between nodes and a highly dynamic network topology. Traditional routing protocols and security schemes are designed for essentially static networks and do not perform well in this case. This has given...
In this paper, we investigate the problem of primary receiver protection in a cell-based network after the presence of the primary transmitter has been detected by cognitive radio. Since the primary transmitter may unicast, multicast or broadcast data to receivers anywhere in the cell, our goal is to protect the entire cell so the received SINR anywhere in the cell is maintained above the target QoS...
In this research, we propose a robust Sybil attack detection framework for MANETs based on cooperative monitoring of network activities. We do not require designated and honest monitors to perform the Sybil attack detection. Each mobile node in the network observes packets passing through it and periodically exchanges its observations in order to determine the presence of an attack. Malicious nodes...
"The Marauder's Map" is a magical map in J. K. Rowling's fantasy series, "Harry Potter and the Prisoner of Azkaban". It shows all moving objects within the boundary of the "Hogwarts School of Witchcraft and Wizardry". In this paper, we introduce a similar attack to location privacy in wireless networks. Our system, namely the digital Marauder's map, can reveal the locations...
As the complexity of systems is rapidly growing, the designers are moving towards use system level design Languages (SLDL) such as SystemC and SpecC. In this paper we use SystemC and SpecC languages for modeling and simulation of wireless sensor networks (WSN). First we start on simple ECO model and add modular sections as increases as the complexity. In the next step, we add data encryption using...
In this paper, we show new smart attacks which were not dealt with in the solutions proposed recently. We focus on the Medium Access Control (MAC), particularly the IEEE 802.11 and we study some hidden vulnerabilities based on the control packets. The malicious nodes can exploit these vulnerabilities to reduce the network's performance, to disturb the monitoring, routing processes and to escape the...
In this letter a weakness of certain broadcast encryption schemes in which the protected delivery of a session key (SEK) is based on XOR-ing this SEK with the IDs of the keys employed for its encryption is addressed. The weakness can be effectively explored assuming passive attacking which in the cases corresponding to a malicious legitimate user being the attacker, is a ciphertext only attack. A...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.