725 research outputs found

    Security in Wireless Sensor Networks: Issues and Challenges

    Get PDF
    Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks.Comment: 6 page

    A Mobile Multimedia Data Collection Scheme for Secured Wireless Multimedia Sensor Networks

    Full text link
    © 2013 IEEE. Wireless Multimedia Sensor Networks (WMSNs) produce enormous amounts of big multimedia data. Due to large size, Multimedia Sensor Nodes (MSNs) cannot store generated multimedia data for a long time. In this scenario, mobile sinks can be utilized for data collection. However, due to vulnerable nature of wireless networks, there is a need for an efficient security scheme to authenticate both MSNs and mobile sinks. In this paper, we propose a scheme to protect an underlying WMSN during mobile multimedia data collection. The proposed scheme is a two-layer scheme. At the first layer, all MSNs are distributed into small clusters, where each cluster is represented by a single Cluster Head (CH). At the second layer, all CHs verify identities of mobile sinks before sharing multimedia data. Authentication at both layers ensures a secure data exchange. We evaluate the performance of proposed scheme through extensive simulation results. The simulation results prove that the proposed scheme performs better as compared to existing state-of-the-art approaches in terms of resilience and handshake duration. The proposed scheme is also analyzed in terms of authentication rate, data freshness, and packet delivery ratio, and has shown a better performance

    Cloud Computing in VANETs: Architecture, Taxonomy, and Challenges

    Get PDF
    Cloud Computing in VANETs (CC-V) has been investigated into two major themes of research including Vehicular Cloud Computing (VCC) and Vehicle using Cloud (VuC). VCC is the realization of autonomous cloud among vehicles to share their abundant resources. VuC is the efficient usage of conventional cloud by on-road vehicles via a reliable Internet connection. Recently, number of advancements have been made to address the issues and challenges in VCC and VuC. This paper qualitatively reviews CC-V with the emphasis on layered architecture, network component, taxonomy, and future challenges. Specifically, a four-layered architecture for CC-V is proposed including perception, co-ordination, artificial intelligence and smart application layers. Three network component of CC-V namely, vehicle, connection and computation are explored with their cooperative roles. A taxonomy for CC-V is presented considering major themes of research in the area including design of architecture, data dissemination, security, and applications. Related literature on each theme are critically investigated with comparative assessment of recent advances. Finally, some open research challenges are identified as future issues. The challenges are the outcome of the critical and qualitative assessment of literature on CC-V

    Sustainability Model for the Internet of Health Things (IoHT) Using Reinforcement Learning with Mobile Edge Secured Services

    Full text link
    [EN] In wireless multimedia networks, the Internet of Things (IoT) and visual sensors are used to interpret and exchange vast data in the form of images. The digital images are subsequently delivered to cloud systems via a sink node, where they are interacted with by smart communication systems using physical devices. Visual sensors are becoming a more significant part of digital systems and can help us live in a more intelligent world. However, for IoT-based data analytics, optimizing communications overhead by balancing the usage of energy and bandwidth resources is a new research challenge. Furthermore, protecting the IoT network's data from anonymous attackers is critical. As a result, utilizing machine learning, this study proposes a mobile edge computing model with a secured cloud (MEC-Seccloud) for a sustainable Internet of Health Things (IoHT), providing real-time quality of service (QoS) for big data analytics while maintaining the integrity of green technologies. We investigate a reinforcement learning optimization technique to enable sensor interaction by examining metaheuristic methods and optimally transferring health-related information with the interaction of mobile edges. Furthermore, two-phase encryptions are used to guarantee data concealment and to provide secured wireless connectivity with cloud networks. The proposed model has shown considerable performance for various network metrics compared with earlier studies.This work has been partially funded by the "La Fundacion para el Fomento de la Investigacion Sanitaria y Biomedica de la Comunitat Valenciana (Fisabio)" through the project PULSIDATA (A43). This research is supported by the Artificial Intelligence & Data Analytics Lab (AIDA), CCIS Prince Sultan University, Riyadh, Saudi Arabia. The authors are thankful for technical support.Rehman, A.; Saba, T.; Haseeb, K.; Alam, T.; Lloret, J. (2022). Sustainability Model for the Internet of Health Things (IoHT) Using Reinforcement Learning with Mobile Edge Secured Services. Sustainability. 14(19):1-14. https://doi.org/10.3390/su141912185114141

    Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

    Get PDF
    Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource utilization and prolong the lifespan of the network. In this paper, we present an extensive literature review over the period 2002-2013 of machine learning methods that were used to address common issues in wireless sensor networks (WSNs). The advantages and disadvantages of each proposed algorithm are evaluated against the corresponding problem. We also provide a comparative guide to aid WSN designers in developing suitable machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial
    corecore