3,369 research outputs found
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Mobility and Address Freedom in AllNet
Mobile devices can be addressed through a variety of means.
We propose that each device select its own addresses, we
motivate this choice, and we describe mechanisms for deliv-
ering data using these addresses.
Hierarchical point-of-attachment addresses are not effec-
tive with mobile devices. The network has to maintain a
global mapping between addresses and locations whether or
not the address is topological. Since this mapping is needed
anyway, there is not much point in having the structure of the
address encode device location. Instead, we have designed
a network protocol, AllNet, to support self-selected address-
ing. When data is transmitted over the Internet, a Distributed
Hash Table (DHT) provides a connection between senders
and and receivers.
The advantages of self-selected addresses include the abil-
ity of devices to join and form a network without any need
for prior agreement, and the ability to choose a personal,
memorable address. When multiple devices choose the same
address another mechanism, such as signed and encrypted
messages, provides the necessary disambiguation
Framework for Anonymous Secure Data Transfer in Vehicular Ad-Hoc Networks
With the increasing number of Vehicular Autonomous Network (VANET) architectures and applications, user privacy must be addressed and protected. Internet of Things (IoT) and their applications take care of everyday mundane task in order to increase user convenience and productivity. However, studies have shown that IoT architectures can be a weak spot in network security, including data being sent plain text. In this thesis, a VANET architecture is proposed that is capable of securing anonymous data collection from a distributed set of autonomous vehicles. The proposed architecture features a hybrid combination of centralized and decentralized routing concepts. Unlike other VANET implementations, our proposed architecture provides anonymity to users in the network. Lower latency can be achieved by merging data from live short-range ad-hoc routing methods with the data collected from a pseudo-live long range centralized routing methods. The proposed architecture guarantees user anonymity within the VANET framework. Most VANET models assume users do not value the privacy of their identity. We assume that each vehicle is equipped with a VANET computer capable of storing data, performing calculations, and both sending and receiving data wirelessly. Therefore vehicles can communicate directly with each other and exchange data within short distances as well as communicate with long-range wireless infrastructure. Simulation results show the implementation is equipped to handle diverse traffic scenarios as well as deter adversaries to the network from maliciously trying to manipulate collected data
- …