10 research outputs found

    Wireless Sensor Networks (WSNs): Security and Privacy Issues and Solutions

    Get PDF
    Wireless sensor networks (WSNs) have become one of the current research areas, and it proves to be a very supportive technology for various applications such as environmental-, military-, health-, home-, and office-based applications. WSN can either be mobile wireless sensor network (MWSN) or static wireless sensor network (SWSN). MWSN is a specialized wireless network consisting of considerable number of mobile sensors, however the instability of its topology introduces several performance issues during data routing. SWSNs consisting of static nodes with static topology also share some of the security challenges of MWSNs due to some constraints associated with the sensor nodes. Security, privacy, computation and energy constraints, and reliability issues are the major challenges facing WSNs, especially during routing. To solve these challenges, WSN routing protocols must ensure confidentiality, integrity, privacy preservation, and reliability in the network. Thus, efficient and energy-aware countermeasures have to be designed to prevent intrusion in the network. In this chapter, we describe different forms of WSNs, challenges, solutions, and a point-to-point multi-hop-based secure solution for effective routing in WSNs

    SAPMS: a secure and anonymous parking management system for autonomous vehicles

    No full text

    SAPMS: a secure and anonymous parking management system for autonomous vehicles

    No full text

    On Secrecy Performance of a Dual-Hop UAV-Assisted Relaying Network with Randomly Distributed Non-Colluding Eavesdroppers: A Stochastic Geometry Approach

    No full text
    Unmanned aerial vehicle (UAV)-based relaying has been considered to offer an excellent performance due to its flexible mobility, on-demand deployment, and cost effectiveness compared to conventional ground-relaying methods. This paper studies the secrecy performance of a dual-hop UAV-assisted relay network, where the base station communicates with the ground user via a low altitude UAV in the presence of randomly distributed eavesdroppers. A stochastic geometric approach is employed to model the spatial locations of the ground user and the eavesdroppers which follows a Homogeneous Poisson Point Process (HPPP). Based on this theory, cumulative distribution functions (CDF) of the ground user and the eavesdroppers are obtained. Considering the decode-and-forward (DF) relay protocol, the CDF equivalent end-to-end instantaneous signal-to-noise ratio (SNR) of the network is derived. To characterize the network secrecy performance, the exact analytical expressions for the network security outage probability (SOP), the strictly positive secrecy capacity (SPSC), and the average secrecy capacity (ASC) are derived. Moreover, a Monte-Carlo simulation is provided to show the accuracy of the derived analytical expressions. The results depict that both the network and channel parameters that include the fading parameter, the density of the eavesdroppers, the average SNR of the B-to-U link, the average SNR of the U-to-E link, the UAV altitude, and the coverage radius have a significant influence on the network secrecy performance

    On Secrecy Performance of a Dual-Hop UAV-Assisted Relaying Network with Randomly Distributed Non-Colluding Eavesdroppers: A Stochastic Geometry Approach

    No full text
    Unmanned aerial vehicle (UAV)-based relaying has been considered to offer an excellent performance due to its flexible mobility, on-demand deployment, and cost effectiveness compared to conventional ground-relaying methods. This paper studies the secrecy performance of a dual-hop UAV-assisted relay network, where the base station communicates with the ground user via a low altitude UAV in the presence of randomly distributed eavesdroppers. A stochastic geometric approach is employed to model the spatial locations of the ground user and the eavesdroppers which follows a Homogeneous Poisson Point Process (HPPP). Based on this theory, cumulative distribution functions (CDF) of the ground user and the eavesdroppers are obtained. Considering the decode-and-forward (DF) relay protocol, the CDF equivalent end-to-end instantaneous signal-to-noise ratio (SNR) of the network is derived. To characterize the network secrecy performance, the exact analytical expressions for the network security outage probability (SOP), the strictly positive secrecy capacity (SPSC), and the average secrecy capacity (ASC) are derived. Moreover, a Monte-Carlo simulation is provided to show the accuracy of the derived analytical expressions. The results depict that both the network and channel parameters that include the fading parameter, the density of the eavesdroppers, the average SNR of the B-to-U link, the average SNR of the U-to-E link, the UAV altitude, and the coverage radius have a significant influence on the network secrecy performance
    corecore