Academic literature on the topic 'A security framework for wireless sensor networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'A security framework for wireless sensor networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "A security framework for wireless sensor networks"

1

Guyeux, Christophe, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, and Jacques M. Bahi. "A Complete Security Framework for Wireless Sensor Networks." International Journal of Information Technology and Web Engineering 10, no. 1 (January 2015): 47–74. http://dx.doi.org/10.4018/ijitwe.2015010103.

Full text
Abstract:
Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework, the authors emphasize the following areas: (1) secure communication infrastructure, (2) secure scheduling, and (3) a secure data aggregation algorithm. Due to resource constraints, specific strategies are often necessary to preserve the network's lifetime and its quality of service. For instance, to reduce communication costs, data can be aggregated through the network, or nodes can go to sleep mode periodically (nodes scheduling). These strategies must be proven as secure, but protocols used to guarantee this security must be compatible with the resource preservation requirement. To achieve this goal, secure communications in such networks will be defined, together with the notions of secure scheduling and secure aggregation. The concepts of indistinguability, nonmalleability, and message detection resistance will thus be adapted to communications in wireless sensor networks. Finally, some of these security properties will be evaluated in concrete case studies.
APA, Harvard, Vancouver, ISO, and other styles
2

Prasad, Neeli R., and Mahbubul Alam. "Security Framework for Wireless Sensor Networks." Wireless Personal Communications 37, no. 3-4 (May 16, 2006): 455–69. http://dx.doi.org/10.1007/s11277-006-9044-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

El Zouka, Hesham A. "An Adaptable Security Framework for Wireless Sensor Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (September 30, 2014): 4898–906. http://dx.doi.org/10.24297/ijct.v13i9.2390.

Full text
Abstract:
The design of secure and survivable nodes is one of the most vital issues in designing energy-efficient protocols for wireless sensor network where the energy, memory and computational power of sensor nodes are limited. In this paper, some of the challenges facing the wireless sensor networks are discussed in attempting to prolong the battery lifetime of the nodes, and to secure the communication channel. While most of these attacks can be dealt with through cryptographic security protocols provided by key management schemes, there are always a few that manage to really cause problems. One such attack that is most common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture and compromise some nodes and inject them into several locations throughout the network in order to conduct other types of attacks. Moreover, if this attack is not detected early, then these replicated injected nodes will consume a large amount of the network resources. Several possible approaches are suggested to improve the security, authentication protocols, and key management schemes in WSNs. Furthermore, utilizing the existing security protocols in wireless sensor networks has led us to propose a secure framework which incorporates security protocols in a way that minimizes the energy consumption of the sensor nodes. Our algorithm ensures data confidentiality, node authentication, and data integrity while remaining within acceptable memory, time and energy constrains.
APA, Harvard, Vancouver, ISO, and other styles
4

TIAN, Bin, Yi-xian YANG, Dong LI, Qi LI, and Yang XIN. "A security framework for wireless sensor networks." Journal of China Universities of Posts and Telecommunications 17 (December 2010): 118–22. http://dx.doi.org/10.1016/s1005-8885(09)60571-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Divya, K., and B. Srinivasan. "Review on Security in Wireless Sensor Networks." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 63–66. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1956.

Full text
Abstract:
Wireless Sensor Networks (WSN) is a rising innovation and step by step it is pulling in the consideration of scientists with its testing qualities and differentiated application space. The more scientists attempt to grow encourage cost and vitality proficient figuring gadgets and calculations for WSN, the all the more difficult it gets to be to fit the security of WSN into that obliged environment. Be that as it may, security is vital to the accomplishment of applying WSN. Along these lines, commonality with the security parts of WSN is basic before planning WSN framework. In this paper, we review the condition of craftsmanship in securing remote sensor systems. We audit a few conventions that give security in sensor systems. Additionally, this study records the notable assaults at the Network layer of WSN.
APA, Harvard, Vancouver, ISO, and other styles
6

Wei, Min, Kee Wook Rim, and Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks." Applied Mechanics and Materials 121-126 (October 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.

Full text
Abstract:
In this paper, we propose an intrusion detection framework through multi-agents scheme for wireless home automation networks. Our mechanisms include the wireless sensor network intrusion detection architecture and an intrusion detection scheme for security enhancement. For the performance evaluation of our mechanism, we use the wireless data measured on the real wireless home networks. The simulation results show that the security manager detect the intrusion attack to improve the whole performance of the system, and can prolong the lifetime of the network.
APA, Harvard, Vancouver, ISO, and other styles
7

V, Malathi. "A Security Framework for Wireless Sensor Networks: IBE-Trust." IOSR Journal of Electronics and Communication Engineering 2, no. 4 (2012): 05–09. http://dx.doi.org/10.9790/2834-0240509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bashar, Abul, and Smys S. "Physical Layer Protection Against Sensor Eavesdropper Channels in Wireless Sensor Networks." June 2021 3, no. 2 (June 3, 2021): 59–67. http://dx.doi.org/10.36548/jsws.2021.2.001.

Full text
Abstract:
This paper presents an analysis of Wireless Sensor Network (WSN) security issues that take place due to eavesdropping. The sensor-eavesdropper channels and the sensor sinks are exposed to generalized K-fading. Based on the physical layer security framework we use cumulative distribution, optimal sensors and round robin scheduling scheme to decrease the probability of interception and to equip secure connection between the nodes. For identifying the interception probability, a novel analytical methodology is present with simple analytical expressions. Moreover, diversity orders of scheduling schemes and asymptotic closed-form expressions are evaluated. Numerical results show the crucial result of shadowing and fading parameters of wiretap and main links, selected schemes on WSN security and network size. We have analyzed the output using Monte Carlo simulation and conclusions show the validation of the proposed work.
APA, Harvard, Vancouver, ISO, and other styles
9

Itani, Wassim, Ayman Kayssi, and Ali Chehab. "Wireless Body Sensor Networks." International Journal of Reliable and Quality E-Healthcare 5, no. 2 (April 2016): 1–30. http://dx.doi.org/10.4018/ijrqeh.2016040101.

Full text
Abstract:
In this paper, the authors provide a detailed overview and technical discussion and analysis of the latest research trends in securing body sensor networks. The core of this work aims at: (1) identifying the resource limitations and energy challenges of this category of wireless sensor networks, (2) considering the life-critical applications and emergency contexts that are encompassed by body sensor network services, and (3) studying the effect of these peculiarities on the design and implementation of rigorous and efficient security algorithms and protocols. The survey discusses the main advancements in the design of body sensor network cryptographic services (key generation and management, authentication, confidentiality, integrity, and privacy) and sheds the light on the prominent developments achieved in the field of securing body sensor network data in Cloud computing architectures. The elastic virtualization mechanisms employed in the Cloud, as well as the lucrative computing and storage resources available, makes the integration of body sensor network applications, and Cloud platforms a natural choice that is packed with various security and privacy challenges. The work presented in this paper focuses on Cloud privacy and integrity mechanisms that rely on tamper-proof hardware and energy-efficient cryptographic data structures that are proving to be well-suited for operation in untrusted Cloud environments. This paper also examines two crucial design patterns that lie at the crux of any successful body sensor network deployment which are represented in: (1) attaining the right balance between the degree, complexity, span, and strength of the cryptographic operations employed and the energy resources they consume. (2) Achieving a feasible tradeoff between the privacy of the human subject wearing the body sensor network and the safety of this subject. This is done by a careful analysis of the medical status of the subject and other context-related information to control the degree of disclosure of sensitive medical data. The paper concludes by presenting a practical overview of the cryptographic support in the main body sensor network development frameworks such and TinyOS and SPINE and introduces a set of generalized guideline patterns and recommendations for designing and implementing cryptographic protocols in body sensor network environments.
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Gaurav, Suman Bala, and Anil K. Verma. "Security Frameworks for Wireless Sensor Networks-Review." Procedia Technology 6 (2012): 978–87. http://dx.doi.org/10.1016/j.protcy.2012.10.119.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "A security framework for wireless sensor networks"

1

Zia, Tanveer. "A Security Framework for Wireless Sensor Networks." University of Sydney, 2008. http://hdl.handle.net/2123/2258.

Full text
Abstract:
Doctor of Philosophy (PhD)
Sensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes etc. However, wireless sensor networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. Though there has been some development in the field of sensor network security, the solutions presented thus far address only some of security problems faced. This research presents a security framework WSNSF (Wireless Sensor Networks Security Framework) to provide a comprehensive security solution against the known attacks in sensor networks. The proposed framework consists of four interacting components: a secure triple-key (STKS) scheme, secure routing algorithms (SRAs), a secure localization technique (SLT) and a malicious node detection mechanism. Singly, each of these components can achieve certain level of security. However, when deployed as a framework, a high degree of security is achievable. WSNSF takes into consideration the communication and computation limitations of sensor networks. While there is always a trade off between security and performance, experimental results prove that the proposed framework can achieve high degree of security with negligible overheads.
APA, Harvard, Vancouver, ISO, and other styles
2

Uluagac, Arif Selcuk. "A secure communication framework for wireless sensor networks." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34713.

Full text
Abstract:
Today, wireless sensor networks (WSNs) are no longer a nascent technology and future networks, especially Cyber-Physical Systems (CPS) will integrate more sensor-based systems into a variety of application scenarios. Typical application areas include medical, environmental, military, and commercial enterprises. Providing security to this diverse set of sensor-based applications is necessary for the healthy operations of the overall system because untrusted entities may target the proper functioning of applications and disturb the critical decision-making processes by injecting false information into the network. One way to address this issue is to employ en-route-filtering-based solutions utilizing keys generated by either static or dynamic key management schemes in the WSN literature. However, current schemes are complicated for resource-constrained sensors as they utilize many keys and more importantly as they transmit many keying messages in the network, which increases the energy consumption of WSNs that are already severely limited in the technical capabilities and resources (i.e., power, computational capacities, and memory) available to them. Nonetheless, further improvements without too much overhead are still possible by sharing a dynamically created cryptic credential. Building upon this idea, the purpose of this thesis is to introduce an efficient and secure communication framework for WSNs. Specifically, three protocols are suggested as contributions using virtual energies and local times onboard the sensors as dynamic cryptic credentials: (1) Virtual Energy-Based Encryption and Keying (VEBEK); (2) TIme-Based DynamiC Keying and En-Route Filtering (TICK); (3) Secure Source-Based Loose Time Synchronization (SOBAS) for WSNs.
APA, Harvard, Vancouver, ISO, and other styles
3

Valero, Marco. "DI-SEC: Distributed Security Framework for Heterogeneous Wireless Sensor Networks." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/cs_diss/66.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are deployed for monitoring in a range of critical domains (e.g., health care, military, critical infrastructure). Accordingly, these WSNs should be resilient to attacks. The current approach to defending against malicious threats is to develop and deploy a specific defense mechanism for a specific attack. However, the problem with this traditional approach to defending sensor networks is that the solution for one attack (i.e., Jamming attack) does not defend against other attacks (e.g., Sybil and Selective Forwarding). This work addresses the challenges with the traditional approach to securing sensor networks and presents a comprehensive framework, Di-Sec, that can defend against all known and forthcoming attacks. At the heart of Di-Sec lies the monitoring core (M-Core), which is an extensible and lightweight layer that gathers information and statistics relevant for creating defense modules. Along with Di-Sec, a new user-friendly domain-specific language was developed, the M-Core Control Language (MCL). Using the MCL, a user can implement new defense mechanisms without the overhead of learning the details of the underlying software architecture (i.e., TinyOS, Di-Sec). Hence, the MCL expedites the development of sensor defense mechanisms by significantly simplifying the coding process for developers. The Di-Sec framework has been implemented and tested on real sensors to evaluate its feasibility and performance. Our evaluation shows that Di-Sec is feasible on today’s resource-limited sensors and has a nominal overhead. Furthermore, we illustrate the functionality of Di-Sec by implementing four detection and defense mechanisms for attacks at various layers of the communication stack.
APA, Harvard, Vancouver, ISO, and other styles
4

PIRES, Higo Fellipe Silva. "ABIDS-WSN: UM FRAMEWORK DE DETECÇÃO DE INTRUSÃO EM REDES DE SENSORES SEM FIO ORIENTADO POR AGENTES INTELIGENTES." Universidade Federal do Maranhão, 2017. http://tedebc.ufma.br:8080/jspui/handle/tede/1772.

Full text
Abstract:
Submitted by Maria Aparecida (cidazen@gmail.com) on 2017-08-01T14:53:33Z No. of bitstreams: 1 Higo Felipe.pdf: 3289455 bytes, checksum: 294f49f96fd41d35ca0024df16006292 (MD5)
Made available in DSpace on 2017-08-01T14:53:33Z (GMT). No. of bitstreams: 1 Higo Felipe.pdf: 3289455 bytes, checksum: 294f49f96fd41d35ca0024df16006292 (MD5) Previous issue date: 2017-01-26
CAPES
Lately, there has been a significant advance in several technologies directly or indirectly related to Ubiquitous Computing. Among them, the technology of Wireless Sensor Networks (WSNs) can be mentioned. Having its space in the current scenario, the use of wireless sensors extends into various branches of human activity: industrial monitoring, smart houses, medical and military applications. However, several shortcomings and limitations in wireless sensors can be noted: limited hardware, energy and computational capacity are points that are always treated by those who work with such devices. As for these devices, there is, besides the factors already mentioned, an important concern regarding their safety. As with other devices, for these threats to be at least mitigated, it is necessary to create layers of security. One of these layers may be formed by Intrusion Detection Systems (IDS). However, due to the aforementioned hardware restriction of the sensors, the development of IDSs - as well as any other application - for such devices should assume such characteristics. As for IDSs, there are some aspects that need to be taken into account, especially flexibility, efficiency and adaptability to new situations. A paradigm that facilitates the implementation of such capabilities is the Intelligent Agents. Therefore, this paper describes the proposition of a framework for intrusion detection in WSNs based on intelligent agents.
Ultimamente, houve um avanço significativo em várias tecnologias direta ou indiretamente correlatas à Computação Ubíqua. Entre elas, pode-se citar a tecnologia das Redes de Sensores sem Fio (WSN s). Tendo já o seu espaço no atual cenário, o uso dos sensores sem fio se estende em vários ramos da atividade humana: monitoramento industrial, smart houses, aplicações médicas e militares. Entretanto, várias deficiências e limitações em sensores sem fio podem ser notadas: recursos limitados de hardware, energia e capacidade computacional são pontos a sempre serem tratados por quem trabalha com tais dispositivos. Quanto a esses dispositivos há, além dos fatores já citados, uma preocupação importante referente á sua segurança. Assim como em outros dispositivos, para que essas ameaças sejam, ao menos, mitigadas é necessário criar camadas de segurança. Uma dessas camadas pode ser formada pelos Sistemas de Detecção de Intrusão (IDS). No entanto, devido à já mencionada restrição de hardware dos sensores, o desenvolvimento de IDSs bem como qualquer outra aplicação para esses dispositivos deve supor tais características. No que se refere, ainda, aos IDSs, há alguns aspectos que devem ser levados em conta, sobretudo flexibilidade, a eficiência e a capacidade de adaptação a novas situações. Um paradigma que facilita a implementação de tais capacidades são os Agentes Inteligentes. Sendo assim, este trabalho descreve a proposta de um framework para detecção de intrusões em WSNs baseado em agentes inteligentes.
APA, Harvard, Vancouver, ISO, and other styles
5

Ren, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Harbin, James R. "Security strategies in wireless sensor networks." Thesis, University of York, 2011. http://etheses.whiterose.ac.uk/2103/.

Full text
Abstract:
This thesis explores security issues in wireless sensor networks (WSNs), and network-layer countermeasures to threats involving routing metrics. Before WSNs can mature to the point of being integrated into daily infrastructure, it is vital that the sensor network technologies involved become sufficiently mature and robust against malicious attack to be trustworthy. Although cryptographic approaches and dedicated security modules are vital, it is important to employ defence in depth via a suite of approaches. A productive approach is to integrate security awareness into the network-layer delivery mechanisms, such as multihop routing or longer-range physical layer approaches. An ideal approach would be workable within realistic channel conditions, impose no complexity for additional control packets or sentry packets, while being fully distributed and scalable. A novel routing protocol is presented (disturbance-based routing) which attempts to avoid wormholes via their static and dynamic topology properties. Simulation results demonstrate its avoidance performance advantages in a variety of topologies. A reputation-based routing approach is introduced, drawing insights from reinforcement learning, which retains routing decisions from an earlier stabilisation phase. Results again demonstrate favourable avoidance properties at a reduced energy cost. Distributed beamforming is explored at the system level, with an architecture provided allowing it to support data delivery in a predominantly multihop routing topology. The vulnerability of beamforming data transmission to jamming attacks is considered analytically and via simulation, and contrasted with multihop routing. A cross-layer approach (physical reputation-based routing) which feeds physical-layer information into the reputation-based routing algorithm is presented, permitting candidate routes that make use of the best beamforming relays to be discovered. Finally, consideration is given to further work on how cognitive security can save energy by allowing nodes to develop a more efficient awareness of their threat environment.
APA, Harvard, Vancouver, ISO, and other styles
7

Vepanjeri, Lokanadha Reddy Sasi Kiran. "Data Security in Unattended Wireless Sensor Networks." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/23646.

Full text
Abstract:
In traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deployed in environments where it is not practical for the sink to be online all the time. Saving data in the memory of the nodes for a long time causes security problems due to the lack of tamper-resistant hardware. Data collected by the nodes has to be secured until the next visit of the sink. Securing the data from an adversary in UWSN is a challenging task. We present two non-cryptographic algorithms (DS-PADV and DS-RADV) to ensure data survivability in mobile UWSN. The DS-PADV protects against proactive adversary which compromises nodes before identifying its target. DS-RADV makes the network secure against reactive adversary which compromises nodes after identifying the target. We also propose a data authentication scheme against a mobile adversary trying to modify the data. The proposed data authentication scheme uses inexpensive cryptographic primitives and few message exchanges. The proposed solutions are analyzed both mathematically and using simulations proving that the proposed solutions are better than the previous ones in terms of security and communication overhead.
APA, Harvard, Vancouver, ISO, and other styles
8

Alarifi, Abdulrahman S. N. "Security through diversity for wireless sensor networks." Related electronic resource:, 2007. http://proquest.umi.com/pqdweb?did=1342747901&sid=1&Fmt=2&clientId=3739&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bagci, Ibrahim Ethem. "Novel security mechanisms for wireless sensor networks." Thesis, Lancaster University, 2016. http://eprints.lancs.ac.uk/78074/.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are used for critical applications such as health care, traffic management or plant automation. Thus, we depend on their availability, and reliable, resilient and accurate operation. It is therefore essential that these systems are protected against attackers who may intend to interfere with operations. Existing security mechanisms cannot always be directly transferred to the application domain of WSNs, and in some cases even novel methods are desirable to give increased protection to these systems. The aim of the work presented in this thesis is to augment security of WSNs by devising novel mechanisms and protocols. In particular, it contributes to areas which require protection mechanisms but have not yet received much attention from the research community. For example, the work addresses the issue of secure storage of data on sensor nodes using cryptographic methods. Although cryptography is needed for basic protection, it cannot always secure the sensor nodes as the keys might be compromised and key management becomes more challenging as the number of deployed sensor nodes increases. Therefore, the work includes mechanisms for node identification and tamper detection by means other than pure cryptography. The three core contributions of this thesis are (i) Methods for confidential data storage on WSN nodes. In particular, fast and energy-efficient data storage and retrieval while maintaining the required protection level is addressed. A framework is presented that provides confidential data storage in WSNs with minimal impact on sensor node operation and performance. This framework is further advanced by combining it with secure communication in WSNs. With this framework, data is stored securely on the flash file system such that it can be directly used for secure transmission, which removes the duplication of security operations on the sensor node. (ii) Methods for node identification based on clock skew. Here, unique clock drift patterns of nodes, which are normally a problem for wireless network operation, are used for non-cryptographic node identification. Clock skew has been previously used for device identification, requiring timestamps to be distributed over the network, but this is impractical in duty-cycled WSNs. To overcome this problem, clock skew is measured locally on the node using precise local clocks. (iii) Methods for tamper detection and node identification based on Channel State Information (CSI). Characteristics of a wireless channel at the receiver are analysed using the CSI of incoming packets to identify the transmitter and to detect tampering on it. If an attacker tampers with the transmitter, it will have an effect on the CSI measured at the receiver. However, tamper-unrelated events, such as walking in the communication environment, also affect CSI values and cause false alarms. This thesis demonstrates that false alarms can be eliminated by analysing the CSI value of a transmitted packet at multiple receivers.
APA, Harvard, Vancouver, ISO, and other styles
10

Engvall, Christoffer. "Security in Wireless Sensor Networks for Open Controller." Thesis, Linköpings universitet, Databas och informationsteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-91089.

Full text
Abstract:
In this thesis we develop, evaluate and implement a security solution for Open Controllers wireless sensor network platform. A scenario is used to describe an exemplar application showing how our system is supposed to function. The security of the platform is analyzed using a well-established threat modeling process and attack trees which result in the identification of a number of risks, which could be security weaknesses. These attack trees visualize the security weaknesses in an easy to access way even for individuals without special security expertise. We develop a security solution to counter these identified risks. The developed security solution consists of three different security levels together with a number of new security policies. Each additional level applies different security mechanisms to provide increasingly improved security for the platform. The new security policies ensure that the security solution is continuously secure during its operating time. We implement part of the security solution in the Contiki operating system to assess its function in practice. Finally we evaluate the developed security solution by looking back to the previously identified weaknesses and the implementation proving that the security solution mitigates the risks.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "A security framework for wireless sensor networks"

1

Oreku, George S., and Tamara Pazynyuk. Security in Wireless Sensor Networks. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-21269-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cayirci, E. Security in wireless ad hoc and sensor networks. Chichester, West Sussex, United Kingdom: Wiley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Çayirci, Erdal, and Chunming Rong. Security in Wireless Ad Hoc and Sensor Networks. Chichester, UK: John Wiley & Sons, Ltd, 2009. http://dx.doi.org/10.1002/9780470516782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

A, Szygenda Stephen, ed. Security for wireless sensor networks using identity-based cryptography. Boca Raton: CRC Press/Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

McNair, Janise (Janise Yvette), 1968- and Corbett, Cherita (Cherita L.), eds. Security in ad hoc and sensor networks. Hackensack, NJ: World Scientific, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mišić, Jelena. Wireless personal area networks: Performance, interconnections and security with IEEE 802.15.4. Chichester, England: Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mišić, Jelena. Wireless personal area networks: Performance, interconnections and security with IEEE 802.15.4. Chichester, West Sussex, England: Wiley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mišić, Jelena. Wireless personal area networks: Performance, interconnections and security with IEEE 802.15.4. Chichester, England: Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lopez, Pedro Peris, Julio C. Hernandez-Castro, and Tieyan Li. Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Hershey, PA: Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wu xian chuan gan qi wang luo Sybil gong ji an quan fang wei ji shu. Beijing: Guo fang gong ye chu ban she, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "A security framework for wireless sensor networks"

1

Stent, Stuart. "A Security Framework for Wireless Sensor Networks." In Communication and Networking, 444–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10844-0_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alagheband, Mahdi R., and Mohammad Reza Aref. "A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks." In Communications and Multimedia Security, 18–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24712-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sandhya, M. K., and K. Murugan. "Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks." In Recent Trends in Network Security and Applications, 1–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14478-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Arain, Adnan Ashraf, Bhawani Shankar Chowdhry, Manzoor Hashmani, Marvie Mussadiq, and Abdul Qadeer Khan Rajput. "A Pretty Safe Strategy for Analyzing Discrete Security Assessment Framework in Wireless Sensor Networks." In Wireless Networks, Information Processing and Systems, 445–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89853-5_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ren, Wei, Jun Song, Zhao Ma, and Shiyong Huang. "Towards a Bio-inspired Security Framework for Mission-Critical Wireless Sensor Networks." In Communications in Computer and Information Science, 35–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04962-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jinwala, Devesh, Dhiren Patel, and Kankar Dasgupta. "Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks." In Information Systems Security, 258–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89862-7_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ashraf, Adnan, AbdulRauf Rajput, Marvie Mussadiq, Bhawani S. Chowdhry, and Manzoor Hashmani. "Improved Classification and Framework Association of Security Vulnerability, Threats and Attacks in Wireless Sensor Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 269–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-11284-3_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Selmic, Rastko R., Vir V. Phoha, and Abdul Serwadda. "Security in WSNs." In Wireless Sensor Networks, 83–115. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46769-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sharma, Bobby. "Wireless Sensor Network Security." In Encyclopedia of Wireless Networks, 1497–501. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Bobby. "Wireless Sensor Network Security." In Encyclopedia of Wireless Networks, 1–6. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32903-1_253-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "A security framework for wireless sensor networks"

1

Gheorghe, Laura, Razvan Rughinis, and Nicolae Tapus. "Adaptive Security Framework for Wireless Sensor Networks." In 2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2012. http://dx.doi.org/10.1109/incos.2012.94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

M. G. de Toledo, Cézar, Doriedson A. G. de Oliveira, Marcos A. Simplicio Jr, and Cintia B. Margi. "Enabling security in software-defined wireless sensor networks for internet of things." In XVIII Escola Regional de Redes de Computadores. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/errc.2020.15198.

Full text
Abstract:
In Software-Defined Wireless Sensor Networks (SDWSN), a logically centralized controller manages data flows according to high level policies. As a result, it provides Wireless Sensor Networks (WSN) with further flexibility and control over its nodes’ behavior. One challenge in this scenario, though, is that SDWSN are mainly composed of resource-constrained devices, which hinders the application of traditional cryptographic protocols in such networks. In this article, we propose a secure framework for SDWSN that takes into account such constraints, enabling the establishment of end-to-end security among nodes and between nodes and the SDN controller. Besides showing how our proposal can enforce different security services in an SDWSN, we also simulate our framework and present a preliminary security cost of framework.
APA, Harvard, Vancouver, ISO, and other styles
3

Ding, Jin, and Krishna M. Sivalingam. "An improved unified network protocol framework for large-scale wireless sensor networks." In Defense and Security, edited by Raghuveer M. Rao, Sohail A. Dianat, and Michael D. Zoltowski. SPIE, 2004. http://dx.doi.org/10.1117/12.548421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yussoff, Yusnani Mohd, and Habibah Hashim. "IBE-Trust: A security framework for Wireless Sensor Networks." In 2011 World Congress on Internet Security (WorldCIS-2011). IEEE, 2011. http://dx.doi.org/10.1109/worldcis17046.2011.5749906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sedjelmaci, Hichem, and Sidi Mohammed Senouci. "A lightweight hybrid security framework for wireless sensor networks." In ICC 2014 - 2014 IEEE International Conference on Communications. IEEE, 2014. http://dx.doi.org/10.1109/icc.2014.6883886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Beheshti, Babak D. "A framework for Wireless Sensor Network security." In 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 2016. http://dx.doi.org/10.1109/lisat.2016.7494109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Oleshchuk, Vladimir. "Trust-based Framework for Security Enhancement of Wireless Sensor Networks." In 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. IEEE, 2007. http://dx.doi.org/10.1109/idaacs.2007.4488496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guyeux, Christophe, Abdallah Makhoul, and Jacques M. Bahi. "A Security Framework for Wireless Sensor Networks: Theory and Practice." In 2014 IEEE 23rd International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprise (WETICE). IEEE, 2014. http://dx.doi.org/10.1109/wetice.2014.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Saxena, Himali, Chunyu Ai, Marco Valero, Yingshu Li, and Raheem Beyah. "DSF - A Distributed Security Framework for heterogeneous wireless sensor networks." In MILCOM 2010 - 2010 IEEE Military Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/milcom.2010.5679559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rassam, Murad A., Mohd Aizaini Maarof, and Anazida Zainal. "A novel intrusion detection framework for Wireless Sensor Networks." In 2011 7th International Conference on Information Assurance and Security (IAS). IEEE, 2011. http://dx.doi.org/10.1109/isias.2011.6122778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography