632 research outputs found

    REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs

    Get PDF
    Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliable and Efficient Integrity Scheme for Data Collection in HWSN (REISCH) to alleviate these problems by using secure and lightweight signature algorithms. The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24% of alive sensors compared to traditional algorithms). Additionally, we use Automated Validation of Internet Security Protocols and Applications (AVISPA) to validate the security procedures in our scheme. Security analysis results confirm that REISCH is safe against some well-known attacks

    Information Assurance Protocols for Body Sensors Using Physiological Data

    Get PDF
    Griffith Sciences, School of Information and Communication TechnologyFull Tex

    Wireless Sensor Networks And Data Fusion For Structural Health Monitoring Of Aircraft

    Get PDF
    This thesis discusses an architecture and design of a sensor web to be used for structural health monitoring of an aircraft. Also presented are several prototypes of critical parts of the sensor web. The proposed sensor web will utilize sensor nodes situated throughout the structure. These nodes and one or more workstations will support agents that communicate and collaborate to monitor the health of the structure. Agents can be any internal or external autonomous entity that has direct access to affect a given system. For the purposes of this document, an agent will be defined as an autonomous software resource that has the ability to make decisions for itself based on given tasks and abilities while also collaborating with others to find a feasible answer to a given problem regarding the structural health monitoring system. Once the agents have received relevant data from nodes, they will utilize applications that perform data fusion techniques to classify events and further improve the functionality of the system for more accurate future classifications. Agents will also pass alerts up a self-configuring hierarchy of monitor agents and make them available for review by personnel. This thesis makes use of previous results from applying the Gaia methodology for analysis and design of the multiagent system

    Wireless Sensor Networks And Data Fusion For Structural Health Monitoring Of Aircraft

    Get PDF
    This thesis discusses an architecture and design of a sensor web to be used for structural health monitoring of an aircraft. Also presented are several prototypes of critical parts of the sensor web. The proposed sensor web will utilize sensor nodes situated throughout the structure. These nodes and one or more workstations will support agents that communicate and collaborate to monitor the health of the structure. Agents can be any internal or external autonomous entity that has direct access to affect a given system. For the purposes of this document, an agent will be defined as an autonomous software resource that has the ability to make decisions for itself based on given tasks and abilities while also collaborating with others to find a feasible answer to a given problem regarding the structural health monitoring system. Once the agents have received relevant data from nodes, they will utilize applications that perform data fusion techniques to classify events and further improve the functionality of the system for more accurate future classifications. Agents will also pass alerts up a self-configuring hierarchy of monitor agents and make them available for review by personnel. This thesis makes use of previous results from applying the Gaia methodology for analysis and design of the multiagent system

    Qualitative and Quantitative Security Analyses for ZigBee Wireless Sensor Networks

    Get PDF

    Investigating Security for Ubiquitous Sensor Networks

    Get PDF
    The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network paradigm which is providing various types of solutions to the community and the individual user in various sectors including environmental monitoring, entertainment, transportation, security, and healthcare. We explore and compare the features of wireless sensor networks and ubiquitous sensor networks and based on the differences between these two types of systems, we classify the security-related challenges of ubiquitous sensor networks. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges that need to be addressed to design more secure ubiquitous sensor networks in the future

    An integrated security Protocol communication scheme for Internet of Things using the Locator/ID Separation Protocol Network

    Get PDF
    Internet of Things communication is mainly based on a machine-to-machine pattern, where devices are globally addressed and identified. However, as the number of connected devices increase, the burdens on the network infrastructure increase as well. The major challenges are the size of the routing tables and the efficiency of the current routing protocols in the Internet backbone. To address these problems, an Internet Engineering Task Force (IETF) working group, along with the research group at Cisco, are still working on the Locator/ID Separation Protocol as a routing architecture that can provide new semantics for the IP addressing, to simplify routing operations and improve scalability in the future of the Internet such as the Internet of Things. Nonetheless, The Locator/ID Separation Protocol is still at an early stage of implementation and the security Protocol e.g. Internet Protocol Security (IPSec), in particular, is still in its infancy. Based on this, three scenarios were considered: Firstly, in the initial stage, each Locator/ID Separation Protocol-capable router needs to register with a Map-Server. This is known as the Registration Stage. Nevertheless, this stage is vulnerable to masquerading and content poisoning attacks. Secondly, the addresses resolving stage, in the Locator/ID Separation Protocol the Map Server (MS) accepts Map-Request from Ingress Tunnel Routers and Egress Tunnel Routers. These routers in trun look up the database and return the requested mapping to the endpoint user. However, this stage lacks data confidentiality and mutual authentication. Furthermore, the Locator/ID Separation Protocol limits the efficiency of the security protocol which works against redirecting the data or acting as fake routers. Thirdly, As a result of the vast increase in the different Internet of Things devices, the interconnected links between these devices increase vastly as well. Thus, the communication between the devices can be easily exposed to disclosures by attackers such as Man in the Middle Attacks (MitM) and Denial of Service Attack (DoS). This research provided a comprehensive study for Communication and Mobility in the Internet of Things as well as the taxonomy of different security protocols. It went on to investigate the security threats and vulnerabilities of Locator/ID Separation Protocol using X.805 framework standard. Then three Security protocols were provided to secure the exchanged transitions of communication in Locator/ID Separation Protocol. The first security protocol had been implemented to secure the Registration stage of Locator/ID separation using ID/Based cryptography method. The second security protocol was implemented to address the Resolving stage in the Locator/ID Separation Protocol between the Ingress Tunnel Router and Egress Tunnel Router using Challenge-Response authentication and Key Agreement technique. Where, the third security protocol had been proposed, analysed and evaluated for the Internet of Things communication devices. This protocol was based on the authentication and the group key agreement via using the El-Gamal concept. The developed protocols set an interface between each level of the phase to achieve security refinement architecture to Internet of Things based on Locator/ID Separation Protocol. These protocols were verified using Automated Validation Internet Security Protocol and Applications (AVISPA) which is a push button tool for the automated validation of security protocols and achieved results demonstrating that they do not have any security flaws. Finally, a performance analysis of security refinement protocol analysis and an evaluation were conducted using Contiki and Cooja simulation tool. The results of the performance analysis showed that the security refinement was highly scalable and the memory was quite efficient as it needed only 72 bytes of memory to store the keys in the Wireless Sensor Network (WSN) device
    • …
    corecore