Journal articles on the topic 'Wireless security networks'

To see the other types of publications on this topic, follow the link: Wireless security networks.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wireless security networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shokrzadeh, Hamid, M. R. Majma, A. Movassagh, and M. Saheb. "Routing Security in Wireless Sensor Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Barinder Paul, Anish Arora, and Ashish Kumar. "Security in Wireless Sensor Networks." JOURNAL OF ADVANCES IN PHYSICS 1, no. 1 (October 25, 2013): 1–4. http://dx.doi.org/10.24297/jap.v1i1.2137.

Full text
Abstract:
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
3

Hari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (December 20, 2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (January 20, 2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.

Full text
Abstract:
One of the most important types that used to transfer data between nodes without using wires is a “wireless communication network”, where the transmission of data is censored remotely by using electromagnetic waves such as radio waves that usually implemented in the physical layer of the network. Continuous improvements in wireless network technology have reduced the security and speed differences between types of networks (wired and wireless), but in turn, increased security threats to wirelessly transmitted data. Wireless networks are weak in terms of "privacy protection" because anyone who is within the coverage area of a wireless network can attempt to break into that network. Hacking incidents have been reported frequently in places with shared free networks, and it has been observed that the places of open distributed networks of the Internet are most at risk of complete penetration of your phone or PC data. To solve this problem, several programs have been developed that provide protection for wireless networks that differ in terms of security. Some of them did not provide sufficient protection for wireless networks, such as Wired Equivalent Privacy (WEP), and others made progress in preventing intrusions compared to their predecessors, such as Wi-Fi Protected Access (WPA).
APA, Harvard, Vancouver, ISO, and other styles
5

ABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (April 1, 2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.

Full text
Abstract:
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, De Feng, Wen Yan Zhang, and Zhi Bin Yang. "Research and Implementation of a Wireless Network Security Inspection Platform for a Power Supply Enterprise." Applied Mechanics and Materials 602-605 (August 2014): 2134–37. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2134.

Full text
Abstract:
Currently, information security inspection can only be conducted via network scan using a laptop, which results in a low-efficient one-by-one check, and moreover lacks the ability to locate wireless networks and not to mention technical measures to discover hidden networks. With respect to the regulations of a power supply enterprise regarding wireless network security, combined with the operation and maintenance comprehensive supervision system (IMS), and the information extranet security monitoring system (ISS), a cascading wireless network security inspection platform is studied and implemented. This paper describes the wireless network encryption technology, and details the deployment pattern and the work flow, etc. about the wireless network security inspection platform. Experiments show that the platform provides support for the information security supervision work of wireless networks and can effectively safeguard the security of wireless networks in a power enterprise.
APA, Harvard, Vancouver, ISO, and other styles
7

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.

Full text
Abstract:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized the various security issues and security threats in WSNs and solutions. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
APA, Harvard, Vancouver, ISO, and other styles
8

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.

Full text
Abstract:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized the various security issues and security threats in WSNs and solutions. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
APA, Harvard, Vancouver, ISO, and other styles
9

Kumari, Shabnam, and Sumit Dalal. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 477–83. http://dx.doi.org/10.31142/ijtsrd12931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Prabhakar, Abhishek, Amod Tiwari, and Vinay Kumar Pathak. "Demand of Wireless Network and Security in Current Research." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (April 19, 2015): 5809–13. http://dx.doi.org/10.24297/ijct.v14i6.1918.

Full text
Abstract:
Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.
APA, Harvard, Vancouver, ISO, and other styles
11

Gao, Feng, and Zhi Hua Hu. "The Security Mechanism for Wireless Sensor Networks." Applied Mechanics and Materials 256-259 (December 2012): 2392–95. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2392.

Full text
Abstract:
In recent years, with advances in microelectronics technology and wireless communication technology which promote the rapid development of low power, low price, multifunction sensor, and it also contributed to the development of wireless sensor networks. Wireless sensor network can be used in military, medical and commercial areas. This paper mainly described the characteristics of wireless sensor networks, security threats in the communication process and analyzed its security needs of taking security mechanisms to ensure the security of wireless communications.
APA, Harvard, Vancouver, ISO, and other styles
12

Khalil Aljwari, Fatimah, Hajer Abdullah Alwadei, and Aseel Abdullah Alfaidi. "Security in Wireless Sensor Networks: Comparative Study." International Journal of Computer Science and Information Technology 14, no. 03 (June 30, 2022): 55–65. http://dx.doi.org/10.5121/ijcsit.2022.14305.

Full text
Abstract:
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed it different attacks. With this in mind, researchers propose in this area variety of security techniques for this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks of wireless sensor networks. The article also aims to provide the basic information related to determining essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against these threats and attacks in Wireless Sensor Network.
APA, Harvard, Vancouver, ISO, and other styles
13

Pradeep and Manjunath. "A SURVEY ON AUTHENTICATION TECHNIQUES FOR WIRELESS MEDIUM." International Journal of Research -GRANTHAALAYAH 6, no. 5 (May 31, 2018): 369–76. http://dx.doi.org/10.29121/granthaalayah.v6.i5.2018.1464.

Full text
Abstract:
The wireless communication technology gaining importance in extreme conditions in a very effective way due to its benefits. Compared to wired networks, wireless networks have many benefits in terms of flexibility, cost, and mobility. Wireless networks can be easily hacked by the outsiders if there is no proper security. Because of its increasing popularity, wireless networks need proper security measures in addition to the normal protections such as firewalls, virus detectors, etc. Providing the required additional security to the wireless networks is a challenging task. Security can be maintained by providing data authenticity, integrity confidentiality, and authorization. A survey on the security of wireless networks is put forward that discusses various techniques which help in protecting the network and a cryptic secure scheme has been proposed which helps to enhance the security standards in the wireless medium.
APA, Harvard, Vancouver, ISO, and other styles
14

K B, Vikhyath, and Dr Brahmanand S. H. "Wireless sensor networks security issues and challenges: A survey." International Journal of Engineering & Technology 7, no. 3.3 (June 8, 2018): 89. http://dx.doi.org/10.14419/ijet.v7i2.33.13861.

Full text
Abstract:
Wireless Sensor Network (WSN) is a rising technology that offers a great assurance towards a variety of revolutionary applications such as military and public. As wireless sensor networks continue to develop, there is a high importance in security mechanisms. As sensor networks works with responsive data and operate in antagonistic environments, it is crucial to address the security issues. The sensing technology united with wireless communication and processing power makes it rewarding. Due to these computing and inherent constraints in resource, sensor network security has special challenges. The low cost and collaborative nature of the wireless networks (WNs) offers significant advantages upon the conventional communication techniques. The wireless communication technology has several kinds of security threats. The spotlight of this paper is towards addressing the security issues and challenges of WSNs. Here the idea is to identify the threats and security mechanism of wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, Wei Guo, and Xiao Lei Li. "Problems and Solutions on Security of Wireless Sensor Network in Facilities on Sports Venues." Applied Mechanics and Materials 339 (July 2013): 195–98. http://dx.doi.org/10.4028/www.scientific.net/amm.339.195.

Full text
Abstract:
Security issue of sensor networks is greatly different from that of conventional networks. In this paper, the characteristics analysis of wireless sensor network (WSN) has been carried out firstly, through analysis, the security architecture of sensor networks is proposed, trying to outline a general illustration on this area, and then security defense on the wireless sensor network security issues has been implemented secondly, finally the pairwise keying algorithm has been described and analyzed ,from above all, the ultimate security solution of wireless sensor network has been proposed.
APA, Harvard, Vancouver, ISO, and other styles
16

Karpenko, Andrii, Tetiana Bondarenko, Viacheslav Ovsiannikov, and Valerii Martyniuk. "ENSURING INFORMATION SECURITY IN WIRELESS SENSOR NETWORKS." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 54–66. http://dx.doi.org/10.28925/2663-4023.2020.10.5466.

Full text
Abstract:
The problem of information security in wireless sensor networks is considered in this paper. An analysis of existing recommendations for information security in wireless sensor networks. It was found that one of the key problems of information security is the hardware limitations of the sensor nodes of the network. It is substantiated that the use of more complex cryptographic protection mechanisms will increase the load on the network. Safety requirements and their description are given. The main groups and types of information security threats in wireless sensor networks are considered. The classification of attacks and protection of wireless sensor networks according to the OSI model is presented. The existing solutions for information security are considered and analyzed. The shortcomings and vulnerabilities of the considered solutions are revealed. The method of public key cryptography is considered, the main advantages and disadvantages of this method are revealed. The analysis and comparison of ECC and RSA encryption methods are carried out. It is substantiated that the use of ECC in wireless sensor networks is more efficient than RSA. The method of cryptography with a symmetric key is considered, the main advantages and disadvantages of this method are indicated. It was found that cryptographic methods using a symmetric key are more priority for use in wireless sensor networks. Cryptographic key management protocols in wireless sensor networks are considered. The classification of key management protocols is given. Secure routing protocols are considered. The classification of secure routing protocols is given. Methods of secure data aggregation are considered. Contradictions between the requirements for confidentiality and data aggregation have been revealed. The method of intrusion detection is considered, the main advantages and disadvantages of this method are revealed. The results of this work should be used in the design of wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
17

Tiberti, Walter, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, and Fortunato Santucci. "Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 10 (October 2020): 155014772095167. http://dx.doi.org/10.1177/1550147720951673.

Full text
Abstract:
Among the classes of wireless personal area networks, a wireless sensor network typically refers to a versatile and densely distributed sensing platform that enables the support of a wide variety of application domains. Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones and relates to the need of guaranteeing reliability and trustiness of the collected data. This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. In particular, moving from some results previously achieved in our research activity, this article extends a cryptography scheme in order to better comply with the security requirements that arise from real-world wireless sensor network installations. The proposed scheme, called topology-authenticated key scheme 2, takes advantage of hybrid cryptography to provide security in the presence of resource-constrained sensor nodes using topology-authenticated keys to provide increased robustness to the scheme itself. The proposed extensions provide full practical support to star-topology wireless sensor networks and the article presents also some experimental results obtained by implementing the scheme on two different wireless sensor network platforms available for protocol stacks compliant with the IEEE 802.15.4 standard.
APA, Harvard, Vancouver, ISO, and other styles
18

Kalniņš, Rūdolfs, Jānis Puriņš, and Gundars Alksnis. "Security Evaluation of Wireless Network Access Points." Applied Computer Systems 21, no. 1 (May 24, 2017): 38–45. http://dx.doi.org/10.1515/acss-2017-0005.

Full text
Abstract:
Abstract The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
19

Xia, Zhengxin, Zhe Wei, and Huan Zhang. "Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks." Computational Intelligence and Neuroscience 2022 (September 27, 2022): 1–9. http://dx.doi.org/10.1155/2022/3449428.

Full text
Abstract:
The scale of wireless sensor networks changes depending on specific application tasks. How to design a relatively simple security mechanism that can extend with the expansion of network scale is an arduous task. As the wireless sensor network mostly adopts the decentralized organization form, once the network nodes are distributed adequately, it is difficult to find out the failure of any node. In addition, the node has weak resistance to physical damage, so any node in the network may potentially become a cause of security vulnerability. In this study, firstly, the security standards that wireless sensor networks should have and the current security challenges faced by the network are discussed in detail, and the importance of security issues in wireless sensor networks is pointed out. Secondly, this paper studies and analyzes the current situation of wireless sensor network security problems including the internal and external attacks and the active and passive attacks. Thirdly, this paper also discusses the significance, concept, and characteristics of reputation and trust, the division and composition of reputation and trust system, and the common applications of the reputation and trust mechanism in wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
20

Aranzazu Suescún, Catalina. "Security in Wireless Sensor Networks." Sistemas y Telemática 7, no. 13 (August 18, 2009): 43. http://dx.doi.org/10.18046/syt.v7i13.1006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Qian, Yi. "Security and Wireless Communication Networks." IEEE Wireless Communications 27, no. 3 (June 2020): 4–5. http://dx.doi.org/10.1109/mwc.2020.9116078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Xiaojiang Du and Hsiao-Hwa Chen. "Security in wireless sensor networks." IEEE Wireless Communications 15, no. 4 (August 2008): 60–66. http://dx.doi.org/10.1109/mwc.2008.4599222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Krishnamurthy, P., J. Kabara, and T. Anusas-Amornkul. "Security in wireless residential networks." IEEE Transactions on Consumer Electronics 48, no. 1 (February 2002): 157–66. http://dx.doi.org/10.1109/tce.2002.1010106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

S, Sabeena, and Iniya R. "Security in wireless sensor networks." International Journal of Computer Trends and Technology 68, no. 1 (January 25, 2020): 26–30. http://dx.doi.org/10.14445/22312803/ijctt-v68i1p106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Perrig, Adrian, John Stankovic, and David Wagner. "Security in wireless sensor networks." Communications of the ACM 47, no. 6 (June 2004): 53–57. http://dx.doi.org/10.1145/990680.990707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Albermany, Salah A., and Ghazanfar A. Safdar. "Keyless Security in Wireless Networks." Wireless Personal Communications 79, no. 3 (July 25, 2014): 1713–31. http://dx.doi.org/10.1007/s11277-014-1954-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Giruka, Venkata C., Mukesh Singhal, James Royalty, and Srilekha Varanasi. "Security in wireless sensor networks." Wireless Communications and Mobile Computing 8, no. 1 (2007): 1–24. http://dx.doi.org/10.1002/wcm.422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Obaidat, Mohammed S., Petros Nicopolitidis, and Jung-Shian Li. "Security in wireless sensor networks." Security and Communication Networks 2, no. 2 (December 30, 2008): 101–3. http://dx.doi.org/10.1002/sec.92.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Didmanidze, Ibraim, Zebur Beridze, and Vladimir Zaslavski. "Analysis of wireless network security systems problems and those solutions." Modeling, Control and Information Technologies, no. 4 (October 23, 2020): 139–40. http://dx.doi.org/10.31713/mcit.2020.31.

Full text
Abstract:
In the people's lives wireless networks play a big role. It is necessary to understand the basic concept of wireless networks, to consider the security issues related to them, and then observe how they work and what benefits they can bring in different cases. In this regard the given research paper presents the fundamental principles of security as well as related open questions. It reviews the security issues of the wireless networks. Security of protocols of wireless network routing has become an urgent necessity to stimulate the network launching and expand the area of its usage. Therefore, the presented research paper proposes and defines different solutions and concepts for security.
APA, Harvard, Vancouver, ISO, and other styles
30

Rehman, Attique Ur, Muhammad Sajid Mahmood, Shoaib Zafar, Muhammad Ahsan Raza, Fahad Qaswar, Sumayh S. Aljameel, Irfan Ullah Khan, and Nida Aslam. "A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network." Electronics 11, no. 16 (August 12, 2022): 2529. http://dx.doi.org/10.3390/electronics11162529.

Full text
Abstract:
Physical layer security for wireless sensor networks (WSNs) is a laborious and highly critical issue in the world. Wireless sensor networks have great importance in civil and military fields or applications. Security of data/information through wireless medium remains a challenge. The data that we transmit wirelessly has increased the speed of transmission rate. In physical layer security, the data transfer between source and destination is not confidential, and thus the user has privacy issues, which is why improving the security of wireless sensor networks is a prime concern. The loss of physical security causes a great threat to a network. We have various techniques to resolve these issues, such as interference, noise, fading in the communications, etc. In this paper we have surveyed the different parameters of a security design model to highlight the vulnerabilities. Further we have discussed the various attacks on different layers of the TCP/IP model along with their mitigation techniques. We also elaborated on the applications of WSNs in healthcare, military information integration, oil and gas. Finally, we have proposed a solution to enhance the security of WSNs by adopting the alpha method and handshake mechanism with encryption and decryption.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Hao, and Jin Tao Shi. "Safety Protection Technology in the Application of the Wireless Network." Applied Mechanics and Materials 685 (October 2014): 591–94. http://dx.doi.org/10.4028/www.scientific.net/amm.685.591.

Full text
Abstract:
As wireless networks edge closer towards wide-spread deployment, security issues become a central concern.This article analyses the wireless network security and the demand from wireless access control, wireless routing technology, and testing to protect the fields under the wireless network and safety of research progress. We point out its development direction based on the analysis and remark of problems remaining unsolved in wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
32

Guyeux, Christophe, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, and Jacques M. Bahi. "A Complete Security Framework for Wireless Sensor Networks." International Journal of Information Technology and Web Engineering 10, no. 1 (January 2015): 47–74. http://dx.doi.org/10.4018/ijitwe.2015010103.

Full text
Abstract:
Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework, the authors emphasize the following areas: (1) secure communication infrastructure, (2) secure scheduling, and (3) a secure data aggregation algorithm. Due to resource constraints, specific strategies are often necessary to preserve the network's lifetime and its quality of service. For instance, to reduce communication costs, data can be aggregated through the network, or nodes can go to sleep mode periodically (nodes scheduling). These strategies must be proven as secure, but protocols used to guarantee this security must be compatible with the resource preservation requirement. To achieve this goal, secure communications in such networks will be defined, together with the notions of secure scheduling and secure aggregation. The concepts of indistinguability, nonmalleability, and message detection resistance will thus be adapted to communications in wireless sensor networks. Finally, some of these security properties will be evaluated in concrete case studies.
APA, Harvard, Vancouver, ISO, and other styles
33

Zou, Shihong, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, and Bo Hu. "A Survey on Secure Wireless Body Area Networks." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3721234.

Full text
Abstract:
Combining tiny sensors and wireless communication technology, wireless body area network (WBAN) is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.
APA, Harvard, Vancouver, ISO, and other styles
34

Divya, K., and B. Srinivasan. "Review on Security in Wireless Sensor Networks." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 63–66. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1956.

Full text
Abstract:
Wireless Sensor Networks (WSN) is a rising innovation and step by step it is pulling in the consideration of scientists with its testing qualities and differentiated application space. The more scientists attempt to grow encourage cost and vitality proficient figuring gadgets and calculations for WSN, the all the more difficult it gets to be to fit the security of WSN into that obliged environment. Be that as it may, security is vital to the accomplishment of applying WSN. Along these lines, commonality with the security parts of WSN is basic before planning WSN framework. In this paper, we review the condition of craftsmanship in securing remote sensor systems. We audit a few conventions that give security in sensor systems. Additionally, this study records the notable assaults at the Network layer of WSN.
APA, Harvard, Vancouver, ISO, and other styles
35

Setyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.

Full text
Abstract:
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
APA, Harvard, Vancouver, ISO, and other styles
36

Rana, Muhammad Ehsan. "Common Security Protocols for Wireless Networks: A Comparative Analysis." International Journal of Psychosocial Rehabilitation 24, no. 5 (April 20, 2020): 3887–96. http://dx.doi.org/10.37200/ijpr/v24i5/pr202097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Li, Yuanming, Wei Guo, Xuejun Meng, and Wen Xia. "Charging wireless sensor network security technology based on encryption algorithms and dynamic model." International Journal of Distributed Sensor Networks 16, no. 3 (February 29, 2020): 155014772090199. http://dx.doi.org/10.1177/1550147720901999.

Full text
Abstract:
With the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. The purpose of this article is to solve the existing security problems and study the operation process of RC4 and Advanced Encryption Standard algorithms, and the improvement scheme is put forward. This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. Devices accessing the network use 802.1x authentication method and distribute and set security status values for each device, the authentication server uses Remote Authentication Dial in User Service. This article uses the method of virtual private network encryption network to provide an encryption layer for communication between devices and wireless networks, thus, the data in network transmission can be encrypted and protected. In this article, the structure and strategy of Remote Authentication Dial in User Service are changed, in order to ensure the high security of wireless network equipment in the connection process. In the testing phase of this article, we have tested the model in detail several times. Tests are divided into middleman and session interception tests. A large number of test results show that this model can improve the security of wireless network and has good performance.
APA, Harvard, Vancouver, ISO, and other styles
38

Yuan, Bingxia. "A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/5955543.

Full text
Abstract:
In order to enhance the ability of wireless sensor networks to resist various security threats and reduce the limitations caused by the characteristics of wireless sensor networks and sensor nodes, this paper proposes a secure routing protocol for wireless sensor networks based on trust management. Combined with the relevant parameters of wireless sensor network, the simulation experiment is carried out with MATLAB. Aiming at the trust management part of the wireless sensor network security protocol proposed in this paper, the malicious attack environment such as sensor node attributes is simulated to verify the resistance of this model to relevant malicious attacks. For the trust management-based wireless sensor network security routing protocol proposed in this paper, the model included in the protocol is compared to the existing security routing model, combining the characteristics of average simulation transmission, network life, and average routing update time. Experiments show that the model has better routing performance and has improved by an average of about 20%. We offer a new solution to solve the problem of wireless routing security.
APA, Harvard, Vancouver, ISO, and other styles
39

Rath, Mamata, Bibudhendu Pati, and Binod Kumar Pattanayak. "Manifold Surveillance Issues in Wireless Network and the Secured Protocol." International Journal of Information Security and Privacy 14, no. 1 (January 2020): 16–26. http://dx.doi.org/10.4018/ijisp.2020010102.

Full text
Abstract:
With rapid growth of internet users and frequently emerging communication technology, the issues of using web as a worldwide platform and the requirement to design the smart applications to coordinate, discuss, register, and outline gradually emerges. Information transmission through a wireless network involves the radio signals, the arrangement of information packets, and the network topology. As each segment is correlated to each other, it is very essential to employ security mechanism in these components and real security control must be connected on them. Thus, security plays a critical factor in wireless network. This article highlights security issues in current wireless networks such as mobile ad-hoc network and IoT-supported networks and it also proposes a security-based S-RAID protocol design for security control in cluster based wireless networks. Simulation results show proficiency and better transmission rate of the proposal when it was compared with other similar approaches.
APA, Harvard, Vancouver, ISO, and other styles
40

Kar, Dulal C., Hung L. Ngo, and Geetha Sanapala. "Applied Cryptography for Security and Privacy in Wireless Sensor Networks." International Journal of Information Security and Privacy 3, no. 3 (July 2009): 14–36. http://dx.doi.org/10.4018/jisp.2009100702.

Full text
Abstract:
It is challenging to secure a wireless sensor network (WSN) because its inexpensive, tiny sensor nodes do not have the necessary processing capability, memory capacity, and battery life to take advantage of the existing security solutions for traditional networks. Existing security solutions for wireless sensor networks are mostly based on symmetric key cryptography with the assumption that sensor nodes are embedded with secret, temporary startup keys before deployment thus avoiding any use of computationally demanding public key algorithms altogether. However, symmetric key cryptography alone cannot satisfactorily provide all security needs for wireless sensor networks. It is still problematic to replenish an operational wireless sensor network with new sensor nodes securely. Current research on public key cryptography for WSNs shows some promising results, particularly in the use of elliptic curve cryptography and identity based encryption for WSNs. Although security is essential for WSNs, it can complicate some crucial operations of a WSN like data aggregation or in-network data processing that can be affected by a particular security protocol. Accordingly, in this paper, we summarize, discuss, and evaluate recent symmetric key based results reported in literature on sensor network security protocols such as for key establishment, random key pre-distribution, data confidentiality, data integrity, and broadcast authentication as well as expose limitations and issues related to those solutions for WSNs. We also present significant advancement in public key cryptography for WSNs with promising results from elliptic curve cryptography and identity based encryption as well as their limitations for WSNs.
APA, Harvard, Vancouver, ISO, and other styles
41

Zeng, Tao. "Routing Protocol Security Strategies of Non-Uniform Energy Distribution Wireless Network." Applied Mechanics and Materials 536-537 (April 2014): 715–18. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.715.

Full text
Abstract:
Unlike other networks based on wireless sensor networks, such as the characteristics of Ad hoc network design algorithm to reduce the energy consumption of wireless sensor networks. The main study of wireless sensor networks in a variety of energy-saving protocols and algorithms, analyze the impact of these agreements on energy saving in different environments, MAC protocol for wireless sensor network design energy efficient use of its improvement, based on the maximum advantage disjoint approximate area set covering algorithm. Energy efficient or superior energy savings in the paper can prolong survival time of the network to provide scientific reference.
APA, Harvard, Vancouver, ISO, and other styles
42

Shen, Xuemin (Sherman), Chuang Lin, Yan (Lindsay) Sun, Jianping Pan, Peter Langendoerfer, and Zhenfu Cao. "Wireless network security." Wireless Communications and Mobile Computing 6, no. 3 (2006): 269–71. http://dx.doi.org/10.1002/wcm.393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Zhao, Ke, Long Fei Xiao, Ya Long Hu, and Zhong Wang. "Based on the Research of WSN in Information Security Technology." Applied Mechanics and Materials 556-562 (May 2014): 5976–78. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5976.

Full text
Abstract:
With the advance of technology, people is more and more nervous to security threats posed by wireless sensor. Therefore, Based on security technology, this paper puts forward a suitable for the safety management unit used in wireless sensor network, And the provisions of its agreement, authentication methods and security processing methods, making wireless sensor networks can transmit user information in a secure environment, while simulation analysis the affect design module on date security transmission, when the wireless sensor networks have security management unit, it will a better, more reliable transmission environments.
APA, Harvard, Vancouver, ISO, and other styles
44

Wei, Min, Kee Wook Rim, and Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks." Applied Mechanics and Materials 121-126 (October 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.

Full text
Abstract:
In this paper, we propose an intrusion detection framework through multi-agents scheme for wireless home automation networks. Our mechanisms include the wireless sensor network intrusion detection architecture and an intrusion detection scheme for security enhancement. For the performance evaluation of our mechanism, we use the wireless data measured on the real wireless home networks. The simulation results show that the security manager detect the intrusion attack to improve the whole performance of the system, and can prolong the lifetime of the network.
APA, Harvard, Vancouver, ISO, and other styles
45

Firmansyah, Firmansyah, Rachmat Adi Purnama, and Rachmawati Darma Astuti. "OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 15, no. 1 (January 10, 2021): 25–33. http://dx.doi.org/10.47111/jti.v15i1.1910.

Full text
Abstract:
The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login
APA, Harvard, Vancouver, ISO, and other styles
46

Firmansyah, Firmansyah, Rachmat Adi Purnama, and Rachmawati Darma Astuti. "OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 15, no. 1 (January 10, 2021): 25–33. http://dx.doi.org/10.47111/jti.v15i1.1910.

Full text
Abstract:
The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login
APA, Harvard, Vancouver, ISO, and other styles
47

Yang, Bin, Ren Yi Fu, Jian Zhong Diao, and Hui Rong Liu. "Security Mechanisms Analysis for ZigBee Standard Based on AES-CCM*." Advanced Materials Research 468-471 (February 2012): 1359–62. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1359.

Full text
Abstract:
The security of wireless sensor networks is very important. ZigBee technology offers an optional security system to ensure the wireless sensor network runs safely and reliably. This article analysis of the ZigBee security mechanisms, key management, encryption algorithm and its data integrity mechanism, ZigBee security based on the CCM* mode of the AES-128, has several security scheme, which is a relatively reliable wireless sensor network standard.
APA, Harvard, Vancouver, ISO, and other styles
48

Itani, Wassim, Ayman Kayssi, and Ali Chehab. "Wireless Body Sensor Networks." International Journal of Reliable and Quality E-Healthcare 5, no. 2 (April 2016): 1–30. http://dx.doi.org/10.4018/ijrqeh.2016040101.

Full text
Abstract:
In this paper, the authors provide a detailed overview and technical discussion and analysis of the latest research trends in securing body sensor networks. The core of this work aims at: (1) identifying the resource limitations and energy challenges of this category of wireless sensor networks, (2) considering the life-critical applications and emergency contexts that are encompassed by body sensor network services, and (3) studying the effect of these peculiarities on the design and implementation of rigorous and efficient security algorithms and protocols. The survey discusses the main advancements in the design of body sensor network cryptographic services (key generation and management, authentication, confidentiality, integrity, and privacy) and sheds the light on the prominent developments achieved in the field of securing body sensor network data in Cloud computing architectures. The elastic virtualization mechanisms employed in the Cloud, as well as the lucrative computing and storage resources available, makes the integration of body sensor network applications, and Cloud platforms a natural choice that is packed with various security and privacy challenges. The work presented in this paper focuses on Cloud privacy and integrity mechanisms that rely on tamper-proof hardware and energy-efficient cryptographic data structures that are proving to be well-suited for operation in untrusted Cloud environments. This paper also examines two crucial design patterns that lie at the crux of any successful body sensor network deployment which are represented in: (1) attaining the right balance between the degree, complexity, span, and strength of the cryptographic operations employed and the energy resources they consume. (2) Achieving a feasible tradeoff between the privacy of the human subject wearing the body sensor network and the safety of this subject. This is done by a careful analysis of the medical status of the subject and other context-related information to control the degree of disclosure of sensitive medical data. The paper concludes by presenting a practical overview of the cryptographic support in the main body sensor network development frameworks such and TinyOS and SPINE and introduces a set of generalized guideline patterns and recommendations for designing and implementing cryptographic protocols in body sensor network environments.
APA, Harvard, Vancouver, ISO, and other styles
49

Rode, Mrs K. N. "Network Security and Cyber Security: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3404–7. http://dx.doi.org/10.22214/ijraset.2022.44501.

Full text
Abstract:
Abstract: Secure Network has now become a need of any organization. The security threats are increasing day by day and making high speed wired/wireless network and internet services, insecure and unreliable. Now – a - days security measures works more importantly towards fulfilling the cutting edge demands of today’s growing industries. The need is also induced in to the areas like defense, where secure and authenticated access of resources are the key issues related to information security. In this paper Author has described the important measures and parameters regarding large industry/organizational requirements for establishing a secure network. Wi-Fi networks are very common in providing wireless network access to different resources and connecting various devices wirelessly. There are need of different requirements to handle Wi-Fi threats and network hacking attempts. This paper explores important security measures related to different network scenarios, so that a fully secured network environment could be established in an organization. Author also has discussed a case study to illustrate the minimal set of measures required for establishing network security in any organization. We will be analyzing a variety of cyber-attacks and different security methods. We aspire to create research into the subject area. This paper explores how cybercrime has become a serious threat in our lives and we are going to look at a few of the different security methods that are being used in this arena and their various weaknesses.
APA, Harvard, Vancouver, ISO, and other styles
50

Prodanovic, Radomir, and Dejan Simic. "Holistic approach to Wep protocol in securing wireless network infrastructure." Computer Science and Information Systems 3, no. 2 (2006): 97–113. http://dx.doi.org/10.2298/csis0602097p.

Full text
Abstract:
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication confidentiality and integrity. The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparison to the previous security solutions. A proposal of possible security improvements of RSNA (Robust Security Network Association) is presented.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography