The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio Frequency Identification (RFID) is a new automatic identification technology. Widespread application of RFID may leak user's privacy. To solve this problem, an improved RFID privacy protection scheme based on Hash-chain is proposed, in which a database identifier field is introduced in RFID tag. When a RFID tag is identified by a reader, by using of the database identifier field, the reader...
In this paper we are proposing an efficient secure solution to the data centric routing protocol One Phase Pull diffusion which permit multi-hop routing of sensed data. SecOPP provides both Group and Pairwise key distribution with the possibility of rekeying as well as security services: integrity, authentication and confidentiality of exchanged messages. All these are obtained without using a key...
This research gives a new improvement scheme of Lorenz signal based on chaotic masking secure communication, which improves the notable features of Lorenz signal and the confidentiality of transmission signal in channel. The scheme here mainly changes the properties of chaotic signal in both time and frequency domains, which makes the masking signal in channel more like noise. This paper also does...
Wireless communication devices are widely subjected to intruder attacks and in the existing security system, the algorithm consists of a ranging phase that uses the received signal strength to estimate a network radio map and a localization phase which uses a genetic algorithm to obtain the most likely position of the intruder node within the map using the genetic algorithm which is not time consuming...
An efficient authenticating mobile user protocol for wireless communications was proposed in this paper. The most important feature of our proposed protocol has the property of authenticating mobile user. In this scheme, the mobile stations must be authenticated by visit network. We use the pre-computing, unbalanced technique in which mobile stations have far less computational and communication requirements...
The proposed model in this paper is the intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood are within radio range of each other. Such a neighborhood of...
Security issues are paramount in wireless networks even more so than in wired networks. A particularly devastating attack in wireless networks is the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. These tunnels emulate shorter links in the network in which adversary...
It is worth noting that securing group communication in Wireless Sensor Networks (WSNs) has recently been extensively investigated. Although many works have addressed this problem, they have considered the concept of grouping differently. In this paper, we consider a group as being a set of nodes sensing the same type of data and we alternatively propose an efficient secure group communication scheme...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
In this paper, we propose an innovative low-cost biometric authentication scheme based on uniformed Gaussian mixture model (GMM) for secure communications within wireless body area sensor networks (WBASNs), to obviate the cost-prohibitive key exchange problem. In this approach, the sender Inter Pulse Interval (IPI) information is selected as the biometric key for authentication, and a statistical...
In this paper, we propose a probabilistic key predistribution scheme for wireless sensor networks that increases connectivity of the basic scheme while keeping sizes of keyring and key pool fixed. We introduce the concept of XORed key, which is the bitwise XOR of two regular (a.k.a. single) keys. Sensor nodes are preloaded with a mixture of single and XORed keys. Nodes establish secure links by using...
The border region monitoring task can be achieved using surveillance wireless sensor networks. The network detects trespassers and inform the sink node. There are many mobility models proposed for users within an ad hoc network. On the other hand, the behavior of trespassers are generally different than mobile users and does not follow a random pattern. Observations from previous security related...
In this work, we investigate secret key generation from channel states. We point out, by means of a packet-delay-based attack, that observing its own channel states is not the only way an adversary can learn about the channel states of the legitimate communicating parties. The attack suggests that it is not secure to transmit data via the channel whose states generate secret keys. However, not using...
Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. In this note, the attempt is to overcome this elusive task by employing the polar coding technique of Arikan. It is shown that polar codes achieve nontrivial perfect secrecy rates for binary-input...
We study the Gaussian multiple-input multiple-output (MIMO) wiretap channel, which consists of a transmitter, a legitimate user, and an eavesdropper. In this channel, the transmitter sends a common message to both the legitimate user and the eavesdropper. Moreover, the legitimate user receives a private message, which is desired to be kept hidden as much as possible from the eavesdropper. We obtain...
This paper compares several feedback schemes of a limited feedback system in a coordinated cellular networks. In a coordinated system one user can be served by different base stations (BSs) simultaneously. Conventional codebook is intended for single BS, its aim is to maximize the amplitude of the receive signal. When multiple BSs are equipped, phase discrimination among different BSs at the receive...
There has been a tremendous growth in the wireless communication networks and their applications around us. Different applications developed over wireless networks can have very different requirements. For some applications, protection from transmission errors might be of primary, whereas for other application the security and privacy of the information in transit might be the primary requirement...
The success and efficiency of managing an emergency situation (such as rescue operation, fire fighting etc.) depends on enabling a system that would ensure the timely availability of high-quality and latest information to the emergency Mobile Units (MU). The system must ensure the provisioning of relevant information in a secure manner irrespective of the location and/or mobility of the MU. The enabling...
A four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is investigated when the jammer relay is causally given the source message. The source aims to increase the achievable secrecy rates, whereas the jammer relay aims to decrease it. To help the eavesdropper and to decrease achievable perfect secrecy rates, the jammer relay can use pure relaying and/or...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.