6 research outputs found

    An Enhanced Communication Protocol for Location Privacy in WSN

    Get PDF
    Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, which will be represented in a form of data and sent to an aggregator for further processing. WSN is used in many applications, such as object tracking and security monitoring. The objects in many situations need physical and location protection. In addition to the source location privacy, sink location privacy should be provided. Providing an efficient location privacy solution would be challenging due to the open nature of the WSN. Anonymity is a key solution for location privacy. We present a network model that is protected against local, multilocal, and global adversaries that can launch sophisticated passive and active attacks against the WSN.http://dx.doi.org/10.1155/2015/69709

    Security Implementation Using Present-Puffin Protocol

    Get PDF
    The Electronic Product Code Generation 2 (EPC GEN2) protocol does not have any technique to authenticate the Reader before it gives access to the Tag’s memory. In this paper, we use security implementation and mutual authentication between tag and reader of three different lightweight ciphers. We used Hummingbird (HB), PRESENT, and Extended Tiny Encryption Algorithm (XTEA) to encrypt the data and implemented all three algorithms to FPGA devices. We finally implemented PRESENT with PUFFIN as a trail and we got better results compared to the former three ciphers based on performance, data blocks and execution time

    An Improved Novel Key Management Protocol for RFID Systems

    Get PDF
    The growing demand to organize resourceful ways of identification has made "Radio Frequency Identification (RFID)" technology universal. One of the key problems in RFID is security and privacy. Many RFID authentication protocols have been proposed to preserve security and privacy of the system. Nevertheless, most of these protocols are analyzed, and it is shown that they cannot provide security against some RFID attacks. In this paper, we present a novel cryptographic scheme, "Hacker Proof Authentication Protocol (HPAP)" which has been improved for "Multiple Tags" authentication at a single time process. We simulated the system using Java Application, and it is a time-saving process. Simulation using Java shows our protocol is secure with the fastest updating timestamps

    Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

    Get PDF
    Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN.http://dx.doi.org/10.3390/s15030582

    CMOS Image Sensors in Surveillance System Applications

    Get PDF
    Recent technology advances in CMOS image sensors (CIS) enable their utilization in the most demanding of surveillance fields, especially visual surveillance and intrusion detection in intelligent surveillance systems, aerial surveillance in war zones, Earth environmental surveillance by satellites in space monitoring, agricultural monitoring using wireless sensor networks and internet of things and driver assistance in automotive fields. This paper presents an overview of CMOS image sensor-based surveillance applications over the last decade by tabulating the design characteristics related to image quality such as resolution, frame rate, dynamic range, signal-to-noise ratio, and also processing technology. Different models of CMOS image sensors used in all applications have been surveyed and tabulated for every year and application.https://doi.org/10.3390/s2102048

    Sleep-Enabled Roadside Units for Motorway Vehicular Networks

    Get PDF
    In this paper, we introduce a number of generic sleep mechanisms for energy saving at the vehicular roadside units (RSUs). Since random sleep cycles (sleep cycles type-I) were already introduced before, we term the introduced mechanisms sleep cycles (type-II, III, IV, V, VI). Each sleep cycles type arranges the service and sleep sequences distinctively to yield various levels of energy savings and average packet delay. A generic analytic model for the roadside unit (RSU) with such sleep cycles is proposed using G/G/1/K G-vacation queuing, where real vehicular traffic profiles and packet size measurements are utilised. The performance evaluation reveals that with one of the proposed sleep cycles (type-IV), the RSU achieves 68% energy savings and 7.3 ms average packet delay over the day, resulting in respective improvements of 10% and 28% compared to the existing random sleep cycles. These improvements have been achieved under a very conservative operating delay bound for audio conferencing applications. However, modern compression and codecs, due to their leniency on Quality of Service (QoS), would potentially enable higher energy savings through the proposed sleep cycles
    corecore