Results 171 to 180 of about 82,558 (221)
Some of the next articles are maybe not open access.
2016
Security in wireless sensor networks (WSNs) is centered on six fundamental requirements namely, authentication, confidentiality, integrity, reliability, availability and data freshness [4, 39, 52, 62]. In this chapter, we describe these requirements, the different kinds of attacks that aim to compromise these requirements (and hence the security of a ...
Rastko R. Selmic +2 more
openaire +1 more source
Security in wireless sensor networks (WSNs) is centered on six fundamental requirements namely, authentication, confidentiality, integrity, reliability, availability and data freshness [4, 39, 52, 62]. In this chapter, we describe these requirements, the different kinds of attacks that aim to compromise these requirements (and hence the security of a ...
Rastko R. Selmic +2 more
openaire +1 more source
2C-WSN: A Configuration Protocol Based on TDMA Communications over WSN
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 2009The deployment of large-scale wireless sensor networks presents major challenges whose solution requires the design and development of robust and time-efficient protocols. In this work, we focus on the design of an efficient and robust protocol aiming to rapidly configure highly populated networks.
Fernando Royo +3 more
openaire +1 more source
Soft-WSN: Software-Defined WSN Management System for IoT Applications
IEEE Systems Journal, 2018In this paper, we propose a software-defined wireless sensor network architecture ( Soft-WSN )—an effort to support application-aware service provisioning in Internet of Things (IoT). Detailed architecture of the proposed system is presented involving the application, control, and infrastructure layers to enable software-defined networking (SDN) in ...
Samaresh Bera +3 more
openaire +1 more source
Key establishment and management for WSNs
Telecommunication Systems, 2010Wireless Sensor Networks (WSNs) are composed of a large number of low-cost, low-power, and multi-functional sensor nodes that communicate at short distances through wireless links. Those networks could be deployed in an open and hostile environment where attackers may be present.
Znaidi, Wassim, Minier, Marine
openaire +2 more sources
International Journal of Sensor Networks, 2014
Clustering in wireless sensor networks (WSNs) attracted academia and industry alike due to the wide range of their applications. For the limited resources of WSNs, many algorithms have been proposed for efficient clustering. One of the most famous clustering algorithms is hybrid energy efficient distributed (HEED) protocol.
Ahmed E. El-Din, Rabie A. Ramadan
openaire +1 more source
Clustering in wireless sensor networks (WSNs) attracted academia and industry alike due to the wide range of their applications. For the limited resources of WSNs, many algorithms have been proposed for efficient clustering. One of the most famous clustering algorithms is hybrid energy efficient distributed (HEED) protocol.
Ahmed E. El-Din, Rabie A. Ramadan
openaire +1 more source
Integrable Autonomous Devices for WSNs
2017We here present an energy harvesting system for low power sensor applications. The system is a dual band architecture able to capture the largest amount of EM radiation available in the urban environment and to provide an autonomous device potentially with infinitive cycle of use.
PANTOLI, LEONARDO +4 more
openaire +1 more source
2019
Cryptography is the field for mathematically transforming messages to protect their confidentiality from eavesdropping. It is an essential foundation for all secure protocols. This chapter is a concise review of cryptography used in wireless sensor networks (WSNs) beginning with background on symmetric key encryption and the Diffie–Hellman key ...
Thomas M. Chen +2 more
openaire +1 more source
Cryptography is the field for mathematically transforming messages to protect their confidentiality from eavesdropping. It is an essential foundation for all secure protocols. This chapter is a concise review of cryptography used in wireless sensor networks (WSNs) beginning with background on symmetric key encryption and the Diffie–Hellman key ...
Thomas M. Chen +2 more
openaire +1 more source
2016
Testbeds are representative of WSNs, they support the diversity of their hardware and software constituents, they are deployed in the same conditions and would be environment, they make use of the protocols to be used at a larger scale. Testbeds are intended to safeguard would be implemented WSNs from malfunctions that may not be seen in theoretical ...
openaire +1 more source
Testbeds are representative of WSNs, they support the diversity of their hardware and software constituents, they are deployed in the same conditions and would be environment, they make use of the protocols to be used at a larger scale. Testbeds are intended to safeguard would be implemented WSNs from malfunctions that may not be seen in theoretical ...
openaire +1 more source
Reducing Blackhole Effect in WSN
2018The open nature of wireless medium, low processing power, wireless connectivity, changing topology, limited resources and hostile deployment of nodes makes WSN easy for outsider attackers to interrupt the legitimate traffic. This leads to various types of security threats among them active black hole attack in which all received data packets are ...
Sana Akourmis +2 more
openaire +1 more source
Optimizing energy consumption in WSN-based IoT using unequal clustering and sleep scheduling methods
Internet of Things (Netherlands), 2023Asst Ali Kadhum M Al-Qurabat
exaly

