240 research outputs found

    Denial of service in wireless sensor networks: issues and challenges

    Get PDF
    Wireless Sensor Network (WSN), composed of a huge number of resource-constrained sensors can be used for a large number of securitysensitive applications. Regardless of the type of application, smooth collection and delivery of data from this type of network is one of the critical requirements. If the data supply process is hampered and thus the expected services become unavailable due to the intentional attempts of the adversaries, we consider this as a Denial of Service (DoS) attack. As DoS attack targets to jeopardize the usual services, it can often drastically curtail the utility of wireless sensor network. In this short communication, we explore the meaning of DoS in WSN, its effective mitigation techniques, and recent issues and challenges in this research area

    Internet and distributed computing knowledge in todayโ€™s world

    Get PDF
    Editor-in-Chief's foreword for International Journal on Internet and Distributed Computing Systems (IJIDCS

    Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards

    Full text link
    In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh_s legendary timestamp-based remote authentication scheme using smart cards. After analyzing the improved scheme proposed by Yang-Wang-Chang, we have found that their scheme is still insecure and vulnerable to four types of forgery attacks. Hence, in this paper, we prove that, their claim that their scheme is intractable is incorrect. Also, we show that even an attack based on Sun et al._s attack could be launched against their scheme which they claimed to resolve with their proposal.Comment: 3 Page

    Developing an Efficient DMCIS with Next-Generation Wireless Networks

    Get PDF
    The impact of extreme events across the globe is extraordinary which continues to handicap the advancement of the struggling developing societies and threatens most of the industrialized countries in the globe. Various fields of Information and Communication Technology have widely been used for efficient disaster management; but only to a limited extent though, there is a tremendous potential for increasing efficiency and effectiveness in coping with disasters with the utilization of emerging wireless network technologies. Early warning, response to the particular situation and proper recovery are among the main focuses of an efficient disaster management system today. Considering these aspects, in this paper we propose a framework for developing an efficient Disaster Management Communications and Information System (DMCIS) which is basically benefited by the exploitation of the emerging wireless network technologies combined with other networking and data processing technologies.Comment: 6 page

    Secure Clustering in DSN with Key Predistribution and WCDS

    Get PDF
    This paper proposes an efficient approach of secure clustering in distributed sensor networks. The clusters or groups in the network are formed based on offline rank assignment and predistribution of secret keys. Our approach uses the concept of weakly connected dominating set (WCDS) to reduce the number of cluster-heads in the network. The formation of clusters in the network is secured as the secret keys are distributed and used in an efficient way to resist the inclusion of any hostile entity in the clusters. Along with the description of our approach, we present an analysis and comparison of our approach with other schemes. We also mention the limitations of our approach considering the practical implementation of the sensor networks.Comment: 6 page

    Building customer trust in cloud computing model

    Get PDF
    Building customer trust is a huge problem in the cloud computing paradigm. Today, hundreds of companies around the world are offering cloud services in major or minor scale with global or local reach. In spite of the availability of numerous establishments for cloud services, there is a critical link missing with the customers - and that is the lack of appropriate customer trust in the Cloud Providerโ€™s (CPโ€™s) services. The issue of trust in clouds has already been addressed from multiple technical perspectives where the researchers suggested solutions based on the existing knowledge in other computing and communications systems. After our investigation, we suggest a different concept of ensuring trust in cloud services by using the power of Information and Communications Technology (ICT). The basic idea lies in the fact that there should be a global standardization authority which would certify trusted cloud providers which in turn would earn customer trust. Novelty in this concept is mainly in its operational details that we have outlined. The main objective is to analyze various aspects of this proposed model from the policy making issues alongside slightly addressing technical issues. More issues about technicality and practicality can be addressed in future based on this initial framework

    Future Internet Addressing (FI Address)

    Get PDF
    Ann innovative FI address scheme is discusse

    Introduction to wireless sensor network security

    Get PDF
    WSN Security Issues presente

    Security wireless sensor networks: prospects, challenges, and future

    Get PDF
    With the advancements of networking technologies and miniaturization of electronic devices, wireless sensor network (WSN) has become an emerging area of research in academic, industrial, and defense sectors. Different types of sensing technologies combined with processing power and wireless communication capability make sensor networks very lucrative for their abundant use in near future. However, many issues are yet to be solved before their full-scale practical implementations. Among all the research issues in WSN, security is one of the most challenging topics to deal with. The major hurdle of securing a WSN is imposed by the limited resources of the sensors participating in the network. Again, the reliance on wireless communication technology opens the door for various types of security threats and attacks. Considering the special features of this type of network, in this chapter we address the critical security issues in wireless sensor networks. We talk about cryptography, steganography, and other basics of network security and their applicability in WSN. We explore various types of threats and attacks against wireless sensor networks, possible countermeasures, mentionable works done so far, other research issues, etc. We also introduce the view of holistic security and future trends towards research in wireless sensor network security

    Heterogeneous Distributed Sensor Networks (HDSN)

    Get PDF
    A new deployment model of distributed sensor network is presented where sensors with different functional types participate at the same time. In this model the sensors are associated with different deployment sets but they cooperate with each other within and out of their respective sets. We term this network model as Heterogeneous Distributed Sensor Network (HDSN). The heterogeneity here refers to the functional heterogeneity of the sensors participating in the network. The advantages of such network model and potential research scopes are also discussed
    • โ€ฆ
    corecore