227 research outputs found

    Powerful mobile nodes for enhancing wireless sensor networks\u27 security and lifetime

    Get PDF
    To maintain the proper functioning of critical applications based on Wireless Sensor Networks, we must provide an acceptable level of security while taking into account limited capabilities of the sensors. In this paper we proposed a mobile approach to secure data exchanged by structured nodes in cluster. The approach is based on mobile nodes with significant calculation and energy resources that allow cryptographic key management and periodic rekeying. However, mobility in wireless sensor networks aims to increase the security and lifetime of the entire network. The technical methods used in this paper are based on cryptography elliptic curves and key management through a balanced binary tree. To compare the performance of the proposed approach with other mobile algorithms, we focused on the following metrics: the energy consumed by normal sensors and cluster heads, the number of packets exchanged during key installation, time to generate and distribute cryptographic keys, and the memory used by the different sensors to store keys

    Gestion de la sécurité dans les réseaux de capteurs sans fil

    Get PDF

    Annales Mathematicae et Informaticae (44.)

    Get PDF

    A Survey of Cryptography and Key Management Schemes for Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSNs) are made up of a large number of tiny sensors, which can sense, analyze, and communicate information about the outside world. These networks play a significant role in a broad range of fields, from crucial military surveillance applications to monitoring building security. Key management in WSNs is a critical task. While the security and integrity of messages communicated through these networks and the authenticity of the nodes are dependent on the robustness of the key management schemes, designing an efficient key generation, distribution, and revocation scheme is quite challenging. While resource-constrained sensor nodes should not be exposed to computationally demanding asymmetric key algorithms, the use of symmetric key-based systems leaves the entire network vulnerable to several attacks. This chapter provides a comprehensive survey of several well-known cryptographic mechanisms and key management schemes for WSNs

    A review of travel and arrival-time prediction methods on road networks: classification, challenges and opportunities

    Get PDF
    Transportation plays a key role in today’s economy. Hence, intelligent transportation systems have attracted a great deal of attention among research communities. There are a few review papers in this area. Most of them focus only on travel time prediction. Furthermore, these papers do not include recent research. To address these shortcomings, this study aims to examine the research on the arrival and travel time prediction on road-based on recently published articles. More specifically, this paper aims to (i) offer an extensive literature review of the field, provide a complete taxonomy of the existing methods, identify key challenges and limitations associated with the techniques; (ii) present various evaluation metrics, influence factors, exploited dataset as well as describe essential concepts based on a detailed analysis of the recent literature sources; (iii) provide significant information to researchers and transportation applications developer. As a result of a rigorous selection process and a comprehensive analysis, the findings provide a holistic picture of open issues and several important observations that can be considered as feasible opportunities for future research directions

    Annales Mathematicae et Informaticae 2015

    Get PDF
    • …
    corecore