Welcome![Sign In][Sign Up]
Location:
Search - Security in WSn

Search list

[BooksWSNsleach

Description: 基于无线传感器网络的一种安全路由协议 针对无线传感器网络(WSN)中路由协议的安全隐患,提出了一种安全的路由协议.该路由协 议在传统的定向扩散协议基础上增加安全机制,把整个路由过程分为路由建立和路由更新2个阶段,并对其安 全性进行分析.通过在路由建立阶段使用小区密钥和通信密钥,能为网络选择安全的路由;路由更新能在出 现路由故障时重新建立路由,进一步提高了无线传感器网络的路由安全性能. -Wireless sensor networks based on a secure routing protocol for wireless sensor network (WSN) routing protocol in the security risk, a routing protocol security. The routing protocol in the traditional orientation to increase the proliferation of agreements based on the security mechanism, the entire routing process is divided into routing updates and routing to establish two stages, and its security analysis. Routing through the cell-key establishment phase and communication using the key security options for network routing routing update to routing in the event of failure to re-establish routing to further improve the routing of wireless sensor network security .
Platform: | Size: 522240 | Author: 池尚琨 | Hits:

[Otherant.wsn

Description: Wireless Sensor Networks are wireless networks where every nodes recolects surrounding information. WSNs have several aplications such as militar survival, traffic control, building security, scientific research in other planets, etc. This project presents a communication protocol for wireless sensor networks based on the ant colony optimization metaheuristic, which uses artificial ant agents that recolects data from all sensor nodes of the network. Every ants fuzes data from a node and sends it to every other sensor and then to the base station. All ants look for a way to go where there is an energy eficient path.
Platform: | Size: 60416 | Author: rodrigo | Hits:

[Embeded-SCM DevelopSecure_WSN

Description: security concepts in wsn
Platform: | Size: 308224 | Author: joe | Hits:

[Technology Managementstage

Description: The sensor networks application domain continues to increase with the need for an effective security mechanism. The fact that WSN often deal with sensitive data operating in hostile and unexpected environments, makes the concept of security considered essential. However, because of limited resources and low computing capacity of a sensor node, the development of a mechanism that ensures security is a real design challenges. In this report we have tried to propose a new security mechanism dedicated to WSN. Our main objective is to secure the process of transferring data to the base station. The proposed protocol protects transferred data against intruder nodes attacks, using a security mechanism based on the use of control message MAC (Message Authentication Code) for authentication. Our protocol performances are evaluated using the simulator NS2.
Platform: | Size: 2359296 | Author: magazana | Hits:

[Program docWSN_OPNET

Description: Wireless Sensor Networks (WSNs) have attracted much attention in recent years. The potential applications of WSNs are immense. They are used for collecting, storing and sharing sensed data. WSNs have been used for various applica- tions including habitat monitoring, agriculture, nuclear reactor control, security and tactical surveillance. The WSN system developed in this paper is for use in precision agriculture applications, where real time data of climatologically and other environmental properties are sensed and control decisions are taken based on it to modify them. The architec- ture of a WSN system comprises of a set of sensor nodes and a base station that communicate with each other and gather local information to make global decisions about the physical environment. The sensor network is based on the IEEE 802.15.4 standard and two topologies for this application. -Wireless Sensor Networks (WSNs) have attracted much attention in recent years. The potential applications of WSNs are immense. They are used for collecting, storing and sharing sensed data. WSNs have been used for various applica- tions including habitat monitoring, agriculture, nuclear reactor control, security and tactical surveillance. The WSN system developed in this paper is for use in precision agriculture applications, where real time data of climatologically and other environmental properties are sensed and control decisions are taken based on it to modify them. The architec- ture of a WSN system comprises of a set of sensor nodes and a base station that communicate with each other and gather local information to make global decisions about the physical environment. The sensor network is based on the IEEE 802.15.4 standard and two topologies for this application.
Platform: | Size: 491520 | Author: eng | Hits:

[Program docComparison-Based-Analysis-of-Different-Cryptograp

Description: Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.
Platform: | Size: 747520 | Author: zu | Hits:

[Industry researchACR-WES-v5--copy

Description: Wireless Embedded Systems (WEBs) has attracted significant interest in recent years, for instance, Wireless Sensor Networks (WSN), have recently been in the limelight for many domains. The characteristics of WEBs have imposed various restrictions on their system designs. Since embedded systems usually are developed by low-cost hardware, one major challenge in the development of many WEBs applications is to provide high-security features with limited resources. In this paper, we propose a novel key establishment scheme, named half-key scheme that based on the well-known random key pre-distribution scheme and DDHV-D deployment knowledge to provide resource-efficient key management in WEBs with reduced memory space requirements and better security enforcement. The capability of the proposed approach is evaluated by an analytical model and a series of experiments.
Platform: | Size: 162816 | Author: ufon | Hits:

[Industry researchRTQP-sig-alternate-v2

Description: Wireless Sensor Networks (WSN) have recently been in the limelight for many domains. WSN are useful in data collection, event detection or entity tracking applications. The characteristics of sensor networks have imposed various restrictions on their system designs. Since sensor nodes usually are developed by low-cost hardware, one major challenge in the development of many sensor-network applications is to provide high-security features with limited resources. In this paper, we propose a path generation framework with deadline considerations for real-time query processing. To meet the deadline, the framework will assign the time budget to the routing path, and then, derive a feasible path with the assigned time budget.
Platform: | Size: 323584 | Author: ufon | Hits:

[Program docWLAN-and-WSN-fusion-algorithm

Description: 针对大型建筑物复杂环境室内定位的特殊性,为了克服移动终端采用WLAN或无 线传感器网络单独定位精度不高的局限性,实现移动终端精确定位导航,提出了根据终端位 置环境同时搜索WLAN和无线传感器网络,采用改进后的网络融合定位算法,可以为用户 提供高精度、高概率和高保密性的定位业务。-For large buildings in the complex environment of indoor positioning particularity, in order to overcome the mobile terminal using WLAN or wireless sensor network alone is not high positioning accuracy limitations, to achieve precise positioning and navigation mobile terminal is proposed to simultaneously search and WLAN wireless sensor environment based on terminal location network, using the improved network fusion location algorithm can provide users with high-precision, high-probability and high-security location services.
Platform: | Size: 302080 | Author: 施瞎忙 | Hits:

[Program docZU212409413

Description: Smart home is a house that uses technology to monitor the environment with the help of various sensors, control the electrical appliances and communicate the outer world. Now-a-days the demand for home automation systems in homes and offices are invariably increasing. The home automation system is a key for energy conservation that can be equipped in normal buildings. As there are many benefits of wireless technology over wired, most of the home automation systems are based on the WSN technology. In this paper we present the design and implementation of a smart home based on LabVIEW using wireless sensor network system. The system can monitor the temperature, light, fire & burglar alarm of the house and have infrared sensor to guarantees the family security. The monitored data is automatically stored into an excel file. The system can be connected to internet to monitor the security of home anywhere in the world.-Smart home is a house that uses technology to monitor the environment with the help of various sensors, control the electrical appliances and communicate the outer world. Now-a-days the demand for home automation systems in homes and offices are invariably increasing. The home automation system is a key for energy conservation that can be equipped in normal buildings. As there are many benefits of wireless technology over wired, most of the home automation systems are based on the WSN technology. In this paper we present the design and implementation of a smart home based on LabVIEW using wireless sensor network system. The system can monitor the temperature, light, fire & burglar alarm of the house and have infrared sensor to guarantees the family security. The monitored data is automatically stored into an excel file. The system can be connected to internet to monitor the security of home anywhere in the world.
Platform: | Size: 490496 | Author: ImranKhan | Hits:

[Communication-MobileUWB-based-sensor-networks-for-localization-in-min

Description: Wireless sensor networks (WSN) have attached a great attention in the last few years. WSN offer several advantages over the traditional sensor networks, such as elimination of costly wires, security and larger area coverage. In the last few years, there has been great interest commercial applications based on Ultra Wideband (UWB). It has potentially low complexity, low cost and an excellent time domain resolution which facilitates location and tracking applications.
Platform: | Size: 1150976 | Author: ShAzZ | Hits:

[Industry researchajassp.2014.969.977

Description: Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to large number of sensor nodes and lack of information about deployment and hardware capabilities of sensor node, key management in wireless sensor networks has become a complex task. Limited memory resources and energy constraints are the other issues of key management in WSN. Hence an efficient key management scheme is necessary which reduces the impact of node capture attacks and consume less energy. In this study, we develop a cluster based technique for key management in wireless sensor network.
Platform: | Size: 145408 | Author: senthil | Hits:

[Other1006.5003

Description: Wireless Sensor Networks (WSN) support data collection and distributed data processing by means of very small sensing devices that are easy to tamper and cloning: therefore classical security solutions based on access control and strong authentication are difficult to deploy. In this paper we look at the problem of assessing security of node localization.
Platform: | Size: 434176 | Author: devil1979 | Hits:

[Firewall-Securitynetwork security

Description: Network security in wsn by matlab
Platform: | Size: 1636 | Author: 2381337458@qq.com | Hits:

CodeBus www.codebus.net