28,984 research outputs found

    An identity-based broadcast encryption scheme for mobile ad hoc networks, Journal of Telecommunications and Information Technology, 2006, nr 1

    Get PDF
    Dynamic ad hoc networks facilitate interconnections between mobile devices without the support of any network infrastructure. In this paper, we propose a secure identity-based ad hoc protocol for mobile devices to construct a group key for a setup of a secure communication network in an efficient way and support dynamic changing of network topology. Unlike group key management protocols proposed previously in the literature, mobile devices can use our protocol to construct the group key by observing the others’ identity, like the MAC address, which distinguishes the device from the others. In contrast to other interactive protocols, we only need one broadcast to setup the group key and member removal is also highly efficient. Finally, we discuss the security issues and provide security proofs for our protocol

    Enhanced group-based wireless ad-hoc sensor network protocol

    Full text link
    [EN] Communication is the major energy consumption source in wireless ad-hoc sensor networks. Thus, an efficient tradeoff between the energy cost of the communication and network's performance is a key challenge in conceiving a wireless ad-hoc sensor network. In this article, we propose an improved group-based architecture for wireless ad-hoc sensor networks. An optimized group forming procedure and an efficient communication operation are introduced. In order to validate the proposed approach, we suggest a group-based strategy to monitor pharmaceutical drugs during transportation. Real measurements of temperature and vibration were performed to validate the effectiveness of our approach.Khedher, M.; Lloret, J.; Douik, A. (2016). Enhanced group-based wireless ad-hoc sensor network protocol. International Journal of Distributed Sensor Networks. 12(7):1-18. https://doi.org/10.1177/1550147716659427S118127Dargie, W., & Poellabauer, C. (2010). Fundamentals of Wireless Sensor Networks. doi:10.1002/9780470666388Singh, S. P., & Sharma, S. C. (2015). A Survey on Cluster Based Routing Protocols in Wireless Sensor Networks. Procedia Computer Science, 45, 687-695. doi:10.1016/j.procs.2015.03.133Liao, Y., Qi, H., & Li, W. (2013). Load-Balanced Clustering Algorithm With Distributed Self-Organization for Wireless Sensor Networks. IEEE Sensors Journal, 13(5), 1498-1506. doi:10.1109/jsen.2012.2227704Peng, I.-H., & Chen, Y.-W. (2013). Energy consumption bounds analysis and its applications for grid based wireless sensor networks. Journal of Network and Computer Applications, 36(1), 444-451. doi:10.1016/j.jnca.2012.04.014Lloret, J., Garcia, M., Tomás, J., & Boronat, F. (2008). GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks. Journal of Computer Science and Technology, 23(3), 461-480. doi:10.1007/s11390-008-9147-6Lloret, J., García, M., Boronat, F., & Tomás, J. (s. f.). MANET Protocols Performance in Group-based Networks. IFIP International Federation for Information Processing, 161-172. doi:10.1007/978-0-387-84839-6_13Lloret, J., Garcia, M., & Tomas, J. (s. f.). Improving Mobile and Ad-hoc Networks performance using Group-Based Topologies. Wireless Sensor and Actor Networks II, 209-220. doi:10.1007/978-0-387-09441-0_18Lloret, J., Palau, C., Boronat, F., & Tomas, J. (2008). Improving networks using group-based topologies. Computer Communications, 31(14), 3438-3450. doi:10.1016/j.comcom.2008.05.030Garcia, M., Sendra, S., Lloret, J., & Canovas, A. (2011). Saving energy and improving communications using cooperative group-based Wireless Sensor Networks. Telecommunication Systems, 52(4), 2489-2502. doi:10.1007/s11235-011-9568-3Garcia, M., & Lloret, J. (2009). A Cooperative Group-Based Sensor Network for Environmental Monitoring. Cooperative Design, Visualization, and Engineering, 276-279. doi:10.1007/978-3-642-04265-2_41Shaikh, R. A., Jameel, H., d’ Auriol, B. J., Heejo Lee, Sungyoung Lee, & Young-Jae Song. (2009). Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698-1712. doi:10.1109/tpds.2008.258Chen, Y.-S., Hsu, C.-S., & Lee, H.-K. (2014). An Enhanced Group Mobility Protocol for 6LoWPAN-Based Wireless Body Area Networks. IEEE Sensors Journal, 14(3), 797-807. doi:10.1109/jsen.2013.2287895Yao-Chung Chang, Zhi-Sheng Lin, & Jiann-Liang Chen. (2006). Cluster based self-organization management protocols for wireless sensor networks. IEEE Transactions on Consumer Electronics, 52(1), 75-80. doi:10.1109/tce.2006.1605028Fazio, P., De Rango, F., Sottile, C., & Santamaria, A. F. (2013). Routing Optimization in Vehicular Networks: A New Approach Based on Multiobjective Metrics and Minimum Spanning Tree. International Journal of Distributed Sensor Networks, 9(11), 598675. doi:10.1155/2013/598675Saravanan, M., & Madheswaran, M. (2014). A Hybrid Optimized Weighted Minimum Spanning Tree for the Shortest Intrapath Selection in Wireless Sensor Network. Mathematical Problems in Engineering, 2014, 1-8. doi:10.1155/2014/71342

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table
    corecore