Статті в журналах з теми "Wireless security networks"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Wireless security networks.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Wireless security networks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Shokrzadeh, Hamid, M. R. Majma, A. Movassagh, and M. Saheb. "Routing Security in Wireless Sensor Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Singh, Barinder Paul, Anish Arora, and Ashish Kumar. "Security in Wireless Sensor Networks." JOURNAL OF ADVANCES IN PHYSICS 1, no. 1 (October 25, 2013): 1–4. http://dx.doi.org/10.24297/jap.v1i1.2137.

Повний текст джерела
Анотація:
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (December 20, 2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Hadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (January 20, 2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.

Повний текст джерела
Анотація:
One of the most important types that used to transfer data between nodes without using wires is a “wireless communication network”, where the transmission of data is censored remotely by using electromagnetic waves such as radio waves that usually implemented in the physical layer of the network. Continuous improvements in wireless network technology have reduced the security and speed differences between types of networks (wired and wireless), but in turn, increased security threats to wirelessly transmitted data. Wireless networks are weak in terms of "privacy protection" because anyone who is within the coverage area of a wireless network can attempt to break into that network. Hacking incidents have been reported frequently in places with shared free networks, and it has been observed that the places of open distributed networks of the Internet are most at risk of complete penetration of your phone or PC data. To solve this problem, several programs have been developed that provide protection for wireless networks that differ in terms of security. Some of them did not provide sufficient protection for wireless networks, such as Wired Equivalent Privacy (WEP), and others made progress in preventing intrusions compared to their predecessors, such as Wi-Fi Protected Access (WPA).
Стилі APA, Harvard, Vancouver, ISO та ін.
5

ABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (April 1, 2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.

Повний текст джерела
Анотація:
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Chen, De Feng, Wen Yan Zhang, and Zhi Bin Yang. "Research and Implementation of a Wireless Network Security Inspection Platform for a Power Supply Enterprise." Applied Mechanics and Materials 602-605 (August 2014): 2134–37. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2134.

Повний текст джерела
Анотація:
Currently, information security inspection can only be conducted via network scan using a laptop, which results in a low-efficient one-by-one check, and moreover lacks the ability to locate wireless networks and not to mention technical measures to discover hidden networks. With respect to the regulations of a power supply enterprise regarding wireless network security, combined with the operation and maintenance comprehensive supervision system (IMS), and the information extranet security monitoring system (ISS), a cascading wireless network security inspection platform is studied and implemented. This paper describes the wireless network encryption technology, and details the deployment pattern and the work flow, etc. about the wireless network security inspection platform. Experiments show that the platform provides support for the information security supervision work of wireless networks and can effectively safeguard the security of wireless networks in a power enterprise.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.

Повний текст джерела
Анотація:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized the various security issues and security threats in WSNs and solutions. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (May 31, 2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.

Повний текст джерела
Анотація:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized the various security issues and security threats in WSNs and solutions. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kumari, Shabnam, and Sumit Dalal. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 477–83. http://dx.doi.org/10.31142/ijtsrd12931.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Prabhakar, Abhishek, Amod Tiwari, and Vinay Kumar Pathak. "Demand of Wireless Network and Security in Current Research." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 6 (April 19, 2015): 5809–13. http://dx.doi.org/10.24297/ijct.v14i6.1918.

Повний текст джерела
Анотація:
Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Gao, Feng, and Zhi Hua Hu. "The Security Mechanism for Wireless Sensor Networks." Applied Mechanics and Materials 256-259 (December 2012): 2392–95. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2392.

Повний текст джерела
Анотація:
In recent years, with advances in microelectronics technology and wireless communication technology which promote the rapid development of low power, low price, multifunction sensor, and it also contributed to the development of wireless sensor networks. Wireless sensor network can be used in military, medical and commercial areas. This paper mainly described the characteristics of wireless sensor networks, security threats in the communication process and analyzed its security needs of taking security mechanisms to ensure the security of wireless communications.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Khalil Aljwari, Fatimah, Hajer Abdullah Alwadei, and Aseel Abdullah Alfaidi. "Security in Wireless Sensor Networks: Comparative Study." International Journal of Computer Science and Information Technology 14, no. 03 (June 30, 2022): 55–65. http://dx.doi.org/10.5121/ijcsit.2022.14305.

Повний текст джерела
Анотація:
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed it different attacks. With this in mind, researchers propose in this area variety of security techniques for this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks of wireless sensor networks. The article also aims to provide the basic information related to determining essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against these threats and attacks in Wireless Sensor Network.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Pradeep and Manjunath. "A SURVEY ON AUTHENTICATION TECHNIQUES FOR WIRELESS MEDIUM." International Journal of Research -GRANTHAALAYAH 6, no. 5 (May 31, 2018): 369–76. http://dx.doi.org/10.29121/granthaalayah.v6.i5.2018.1464.

Повний текст джерела
Анотація:
The wireless communication technology gaining importance in extreme conditions in a very effective way due to its benefits. Compared to wired networks, wireless networks have many benefits in terms of flexibility, cost, and mobility. Wireless networks can be easily hacked by the outsiders if there is no proper security. Because of its increasing popularity, wireless networks need proper security measures in addition to the normal protections such as firewalls, virus detectors, etc. Providing the required additional security to the wireless networks is a challenging task. Security can be maintained by providing data authenticity, integrity confidentiality, and authorization. A survey on the security of wireless networks is put forward that discusses various techniques which help in protecting the network and a cryptic secure scheme has been proposed which helps to enhance the security standards in the wireless medium.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

K B, Vikhyath, and Dr Brahmanand S. H. "Wireless sensor networks security issues and challenges: A survey." International Journal of Engineering & Technology 7, no. 3.3 (June 8, 2018): 89. http://dx.doi.org/10.14419/ijet.v7i2.33.13861.

Повний текст джерела
Анотація:
Wireless Sensor Network (WSN) is a rising technology that offers a great assurance towards a variety of revolutionary applications such as military and public. As wireless sensor networks continue to develop, there is a high importance in security mechanisms. As sensor networks works with responsive data and operate in antagonistic environments, it is crucial to address the security issues. The sensing technology united with wireless communication and processing power makes it rewarding. Due to these computing and inherent constraints in resource, sensor network security has special challenges. The low cost and collaborative nature of the wireless networks (WNs) offers significant advantages upon the conventional communication techniques. The wireless communication technology has several kinds of security threats. The spotlight of this paper is towards addressing the security issues and challenges of WSNs. Here the idea is to identify the threats and security mechanism of wireless sensor networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Wang, Wei Guo, and Xiao Lei Li. "Problems and Solutions on Security of Wireless Sensor Network in Facilities on Sports Venues." Applied Mechanics and Materials 339 (July 2013): 195–98. http://dx.doi.org/10.4028/www.scientific.net/amm.339.195.

Повний текст джерела
Анотація:
Security issue of sensor networks is greatly different from that of conventional networks. In this paper, the characteristics analysis of wireless sensor network (WSN) has been carried out firstly, through analysis, the security architecture of sensor networks is proposed, trying to outline a general illustration on this area, and then security defense on the wireless sensor network security issues has been implemented secondly, finally the pairwise keying algorithm has been described and analyzed ,from above all, the ultimate security solution of wireless sensor network has been proposed.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Karpenko, Andrii, Tetiana Bondarenko, Viacheslav Ovsiannikov, and Valerii Martyniuk. "ENSURING INFORMATION SECURITY IN WIRELESS SENSOR NETWORKS." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 54–66. http://dx.doi.org/10.28925/2663-4023.2020.10.5466.

Повний текст джерела
Анотація:
The problem of information security in wireless sensor networks is considered in this paper. An analysis of existing recommendations for information security in wireless sensor networks. It was found that one of the key problems of information security is the hardware limitations of the sensor nodes of the network. It is substantiated that the use of more complex cryptographic protection mechanisms will increase the load on the network. Safety requirements and their description are given. The main groups and types of information security threats in wireless sensor networks are considered. The classification of attacks and protection of wireless sensor networks according to the OSI model is presented. The existing solutions for information security are considered and analyzed. The shortcomings and vulnerabilities of the considered solutions are revealed. The method of public key cryptography is considered, the main advantages and disadvantages of this method are revealed. The analysis and comparison of ECC and RSA encryption methods are carried out. It is substantiated that the use of ECC in wireless sensor networks is more efficient than RSA. The method of cryptography with a symmetric key is considered, the main advantages and disadvantages of this method are indicated. It was found that cryptographic methods using a symmetric key are more priority for use in wireless sensor networks. Cryptographic key management protocols in wireless sensor networks are considered. The classification of key management protocols is given. Secure routing protocols are considered. The classification of secure routing protocols is given. Methods of secure data aggregation are considered. Contradictions between the requirements for confidentiality and data aggregation have been revealed. The method of intrusion detection is considered, the main advantages and disadvantages of this method are revealed. The results of this work should be used in the design of wireless sensor networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Tiberti, Walter, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, and Fortunato Santucci. "Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 10 (October 2020): 155014772095167. http://dx.doi.org/10.1177/1550147720951673.

Повний текст джерела
Анотація:
Among the classes of wireless personal area networks, a wireless sensor network typically refers to a versatile and densely distributed sensing platform that enables the support of a wide variety of application domains. Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones and relates to the need of guaranteeing reliability and trustiness of the collected data. This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. In particular, moving from some results previously achieved in our research activity, this article extends a cryptography scheme in order to better comply with the security requirements that arise from real-world wireless sensor network installations. The proposed scheme, called topology-authenticated key scheme 2, takes advantage of hybrid cryptography to provide security in the presence of resource-constrained sensor nodes using topology-authenticated keys to provide increased robustness to the scheme itself. The proposed extensions provide full practical support to star-topology wireless sensor networks and the article presents also some experimental results obtained by implementing the scheme on two different wireless sensor network platforms available for protocol stacks compliant with the IEEE 802.15.4 standard.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Kalniņš, Rūdolfs, Jānis Puriņš, and Gundars Alksnis. "Security Evaluation of Wireless Network Access Points." Applied Computer Systems 21, no. 1 (May 24, 2017): 38–45. http://dx.doi.org/10.1515/acss-2017-0005.

Повний текст джерела
Анотація:
Abstract The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Xia, Zhengxin, Zhe Wei, and Huan Zhang. "Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks." Computational Intelligence and Neuroscience 2022 (September 27, 2022): 1–9. http://dx.doi.org/10.1155/2022/3449428.

Повний текст джерела
Анотація:
The scale of wireless sensor networks changes depending on specific application tasks. How to design a relatively simple security mechanism that can extend with the expansion of network scale is an arduous task. As the wireless sensor network mostly adopts the decentralized organization form, once the network nodes are distributed adequately, it is difficult to find out the failure of any node. In addition, the node has weak resistance to physical damage, so any node in the network may potentially become a cause of security vulnerability. In this study, firstly, the security standards that wireless sensor networks should have and the current security challenges faced by the network are discussed in detail, and the importance of security issues in wireless sensor networks is pointed out. Secondly, this paper studies and analyzes the current situation of wireless sensor network security problems including the internal and external attacks and the active and passive attacks. Thirdly, this paper also discusses the significance, concept, and characteristics of reputation and trust, the division and composition of reputation and trust system, and the common applications of the reputation and trust mechanism in wireless sensor networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Aranzazu Suescún, Catalina. "Security in Wireless Sensor Networks." Sistemas y Telemática 7, no. 13 (August 18, 2009): 43. http://dx.doi.org/10.18046/syt.v7i13.1006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Qian, Yi. "Security and Wireless Communication Networks." IEEE Wireless Communications 27, no. 3 (June 2020): 4–5. http://dx.doi.org/10.1109/mwc.2020.9116078.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Xiaojiang Du and Hsiao-Hwa Chen. "Security in wireless sensor networks." IEEE Wireless Communications 15, no. 4 (August 2008): 60–66. http://dx.doi.org/10.1109/mwc.2008.4599222.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Krishnamurthy, P., J. Kabara, and T. Anusas-Amornkul. "Security in wireless residential networks." IEEE Transactions on Consumer Electronics 48, no. 1 (February 2002): 157–66. http://dx.doi.org/10.1109/tce.2002.1010106.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

S, Sabeena, and Iniya R. "Security in wireless sensor networks." International Journal of Computer Trends and Technology 68, no. 1 (January 25, 2020): 26–30. http://dx.doi.org/10.14445/22312803/ijctt-v68i1p106.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Perrig, Adrian, John Stankovic, and David Wagner. "Security in wireless sensor networks." Communications of the ACM 47, no. 6 (June 2004): 53–57. http://dx.doi.org/10.1145/990680.990707.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Albermany, Salah A., and Ghazanfar A. Safdar. "Keyless Security in Wireless Networks." Wireless Personal Communications 79, no. 3 (July 25, 2014): 1713–31. http://dx.doi.org/10.1007/s11277-014-1954-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Giruka, Venkata C., Mukesh Singhal, James Royalty, and Srilekha Varanasi. "Security in wireless sensor networks." Wireless Communications and Mobile Computing 8, no. 1 (2007): 1–24. http://dx.doi.org/10.1002/wcm.422.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Obaidat, Mohammed S., Petros Nicopolitidis, and Jung-Shian Li. "Security in wireless sensor networks." Security and Communication Networks 2, no. 2 (December 30, 2008): 101–3. http://dx.doi.org/10.1002/sec.92.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Didmanidze, Ibraim, Zebur Beridze, and Vladimir Zaslavski. "Analysis of wireless network security systems problems and those solutions." Modeling, Control and Information Technologies, no. 4 (October 23, 2020): 139–40. http://dx.doi.org/10.31713/mcit.2020.31.

Повний текст джерела
Анотація:
In the people's lives wireless networks play a big role. It is necessary to understand the basic concept of wireless networks, to consider the security issues related to them, and then observe how they work and what benefits they can bring in different cases. In this regard the given research paper presents the fundamental principles of security as well as related open questions. It reviews the security issues of the wireless networks. Security of protocols of wireless network routing has become an urgent necessity to stimulate the network launching and expand the area of its usage. Therefore, the presented research paper proposes and defines different solutions and concepts for security.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Rehman, Attique Ur, Muhammad Sajid Mahmood, Shoaib Zafar, Muhammad Ahsan Raza, Fahad Qaswar, Sumayh S. Aljameel, Irfan Ullah Khan, and Nida Aslam. "A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network." Electronics 11, no. 16 (August 12, 2022): 2529. http://dx.doi.org/10.3390/electronics11162529.

Повний текст джерела
Анотація:
Physical layer security for wireless sensor networks (WSNs) is a laborious and highly critical issue in the world. Wireless sensor networks have great importance in civil and military fields or applications. Security of data/information through wireless medium remains a challenge. The data that we transmit wirelessly has increased the speed of transmission rate. In physical layer security, the data transfer between source and destination is not confidential, and thus the user has privacy issues, which is why improving the security of wireless sensor networks is a prime concern. The loss of physical security causes a great threat to a network. We have various techniques to resolve these issues, such as interference, noise, fading in the communications, etc. In this paper we have surveyed the different parameters of a security design model to highlight the vulnerabilities. Further we have discussed the various attacks on different layers of the TCP/IP model along with their mitigation techniques. We also elaborated on the applications of WSNs in healthcare, military information integration, oil and gas. Finally, we have proposed a solution to enhance the security of WSNs by adopting the alpha method and handshake mechanism with encryption and decryption.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Wang, Hao, and Jin Tao Shi. "Safety Protection Technology in the Application of the Wireless Network." Applied Mechanics and Materials 685 (October 2014): 591–94. http://dx.doi.org/10.4028/www.scientific.net/amm.685.591.

Повний текст джерела
Анотація:
As wireless networks edge closer towards wide-spread deployment, security issues become a central concern.This article analyses the wireless network security and the demand from wireless access control, wireless routing technology, and testing to protect the fields under the wireless network and safety of research progress. We point out its development direction based on the analysis and remark of problems remaining unsolved in wireless networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Guyeux, Christophe, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, and Jacques M. Bahi. "A Complete Security Framework for Wireless Sensor Networks." International Journal of Information Technology and Web Engineering 10, no. 1 (January 2015): 47–74. http://dx.doi.org/10.4018/ijitwe.2015010103.

Повний текст джерела
Анотація:
Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework, the authors emphasize the following areas: (1) secure communication infrastructure, (2) secure scheduling, and (3) a secure data aggregation algorithm. Due to resource constraints, specific strategies are often necessary to preserve the network's lifetime and its quality of service. For instance, to reduce communication costs, data can be aggregated through the network, or nodes can go to sleep mode periodically (nodes scheduling). These strategies must be proven as secure, but protocols used to guarantee this security must be compatible with the resource preservation requirement. To achieve this goal, secure communications in such networks will be defined, together with the notions of secure scheduling and secure aggregation. The concepts of indistinguability, nonmalleability, and message detection resistance will thus be adapted to communications in wireless sensor networks. Finally, some of these security properties will be evaluated in concrete case studies.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Zou, Shihong, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, and Bo Hu. "A Survey on Secure Wireless Body Area Networks." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/3721234.

Повний текст джерела
Анотація:
Combining tiny sensors and wireless communication technology, wireless body area network (WBAN) is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Divya, K., and B. Srinivasan. "Review on Security in Wireless Sensor Networks." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 63–66. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1956.

Повний текст джерела
Анотація:
Wireless Sensor Networks (WSN) is a rising innovation and step by step it is pulling in the consideration of scientists with its testing qualities and differentiated application space. The more scientists attempt to grow encourage cost and vitality proficient figuring gadgets and calculations for WSN, the all the more difficult it gets to be to fit the security of WSN into that obliged environment. Be that as it may, security is vital to the accomplishment of applying WSN. Along these lines, commonality with the security parts of WSN is basic before planning WSN framework. In this paper, we review the condition of craftsmanship in securing remote sensor systems. We audit a few conventions that give security in sensor systems. Additionally, this study records the notable assaults at the Network layer of WSN.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Setyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.

Повний текст джерела
Анотація:
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Rana, Muhammad Ehsan. "Common Security Protocols for Wireless Networks: A Comparative Analysis." International Journal of Psychosocial Rehabilitation 24, no. 5 (April 20, 2020): 3887–96. http://dx.doi.org/10.37200/ijpr/v24i5/pr202097.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Li, Yuanming, Wei Guo, Xuejun Meng, and Wen Xia. "Charging wireless sensor network security technology based on encryption algorithms and dynamic model." International Journal of Distributed Sensor Networks 16, no. 3 (February 29, 2020): 155014772090199. http://dx.doi.org/10.1177/1550147720901999.

Повний текст джерела
Анотація:
With the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. The purpose of this article is to solve the existing security problems and study the operation process of RC4 and Advanced Encryption Standard algorithms, and the improvement scheme is put forward. This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. Devices accessing the network use 802.1x authentication method and distribute and set security status values for each device, the authentication server uses Remote Authentication Dial in User Service. This article uses the method of virtual private network encryption network to provide an encryption layer for communication between devices and wireless networks, thus, the data in network transmission can be encrypted and protected. In this article, the structure and strategy of Remote Authentication Dial in User Service are changed, in order to ensure the high security of wireless network equipment in the connection process. In the testing phase of this article, we have tested the model in detail several times. Tests are divided into middleman and session interception tests. A large number of test results show that this model can improve the security of wireless network and has good performance.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Yuan, Bingxia. "A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/5955543.

Повний текст джерела
Анотація:
In order to enhance the ability of wireless sensor networks to resist various security threats and reduce the limitations caused by the characteristics of wireless sensor networks and sensor nodes, this paper proposes a secure routing protocol for wireless sensor networks based on trust management. Combined with the relevant parameters of wireless sensor network, the simulation experiment is carried out with MATLAB. Aiming at the trust management part of the wireless sensor network security protocol proposed in this paper, the malicious attack environment such as sensor node attributes is simulated to verify the resistance of this model to relevant malicious attacks. For the trust management-based wireless sensor network security routing protocol proposed in this paper, the model included in the protocol is compared to the existing security routing model, combining the characteristics of average simulation transmission, network life, and average routing update time. Experiments show that the model has better routing performance and has improved by an average of about 20%. We offer a new solution to solve the problem of wireless routing security.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Rath, Mamata, Bibudhendu Pati, and Binod Kumar Pattanayak. "Manifold Surveillance Issues in Wireless Network and the Secured Protocol." International Journal of Information Security and Privacy 14, no. 1 (January 2020): 16–26. http://dx.doi.org/10.4018/ijisp.2020010102.

Повний текст джерела
Анотація:
With rapid growth of internet users and frequently emerging communication technology, the issues of using web as a worldwide platform and the requirement to design the smart applications to coordinate, discuss, register, and outline gradually emerges. Information transmission through a wireless network involves the radio signals, the arrangement of information packets, and the network topology. As each segment is correlated to each other, it is very essential to employ security mechanism in these components and real security control must be connected on them. Thus, security plays a critical factor in wireless network. This article highlights security issues in current wireless networks such as mobile ad-hoc network and IoT-supported networks and it also proposes a security-based S-RAID protocol design for security control in cluster based wireless networks. Simulation results show proficiency and better transmission rate of the proposal when it was compared with other similar approaches.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Kar, Dulal C., Hung L. Ngo, and Geetha Sanapala. "Applied Cryptography for Security and Privacy in Wireless Sensor Networks." International Journal of Information Security and Privacy 3, no. 3 (July 2009): 14–36. http://dx.doi.org/10.4018/jisp.2009100702.

Повний текст джерела
Анотація:
It is challenging to secure a wireless sensor network (WSN) because its inexpensive, tiny sensor nodes do not have the necessary processing capability, memory capacity, and battery life to take advantage of the existing security solutions for traditional networks. Existing security solutions for wireless sensor networks are mostly based on symmetric key cryptography with the assumption that sensor nodes are embedded with secret, temporary startup keys before deployment thus avoiding any use of computationally demanding public key algorithms altogether. However, symmetric key cryptography alone cannot satisfactorily provide all security needs for wireless sensor networks. It is still problematic to replenish an operational wireless sensor network with new sensor nodes securely. Current research on public key cryptography for WSNs shows some promising results, particularly in the use of elliptic curve cryptography and identity based encryption for WSNs. Although security is essential for WSNs, it can complicate some crucial operations of a WSN like data aggregation or in-network data processing that can be affected by a particular security protocol. Accordingly, in this paper, we summarize, discuss, and evaluate recent symmetric key based results reported in literature on sensor network security protocols such as for key establishment, random key pre-distribution, data confidentiality, data integrity, and broadcast authentication as well as expose limitations and issues related to those solutions for WSNs. We also present significant advancement in public key cryptography for WSNs with promising results from elliptic curve cryptography and identity based encryption as well as their limitations for WSNs.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Zeng, Tao. "Routing Protocol Security Strategies of Non-Uniform Energy Distribution Wireless Network." Applied Mechanics and Materials 536-537 (April 2014): 715–18. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.715.

Повний текст джерела
Анотація:
Unlike other networks based on wireless sensor networks, such as the characteristics of Ad hoc network design algorithm to reduce the energy consumption of wireless sensor networks. The main study of wireless sensor networks in a variety of energy-saving protocols and algorithms, analyze the impact of these agreements on energy saving in different environments, MAC protocol for wireless sensor network design energy efficient use of its improvement, based on the maximum advantage disjoint approximate area set covering algorithm. Energy efficient or superior energy savings in the paper can prolong survival time of the network to provide scientific reference.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Shen, Xuemin (Sherman), Chuang Lin, Yan (Lindsay) Sun, Jianping Pan, Peter Langendoerfer, and Zhenfu Cao. "Wireless network security." Wireless Communications and Mobile Computing 6, no. 3 (2006): 269–71. http://dx.doi.org/10.1002/wcm.393.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Zhao, Ke, Long Fei Xiao, Ya Long Hu, and Zhong Wang. "Based on the Research of WSN in Information Security Technology." Applied Mechanics and Materials 556-562 (May 2014): 5976–78. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5976.

Повний текст джерела
Анотація:
With the advance of technology, people is more and more nervous to security threats posed by wireless sensor. Therefore, Based on security technology, this paper puts forward a suitable for the safety management unit used in wireless sensor network, And the provisions of its agreement, authentication methods and security processing methods, making wireless sensor networks can transmit user information in a secure environment, while simulation analysis the affect design module on date security transmission, when the wireless sensor networks have security management unit, it will a better, more reliable transmission environments.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Wei, Min, Kee Wook Rim, and Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks." Applied Mechanics and Materials 121-126 (October 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.

Повний текст джерела
Анотація:
In this paper, we propose an intrusion detection framework through multi-agents scheme for wireless home automation networks. Our mechanisms include the wireless sensor network intrusion detection architecture and an intrusion detection scheme for security enhancement. For the performance evaluation of our mechanism, we use the wireless data measured on the real wireless home networks. The simulation results show that the security manager detect the intrusion attack to improve the whole performance of the system, and can prolong the lifetime of the network.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Firmansyah, Firmansyah, Rachmat Adi Purnama, and Rachmawati Darma Astuti. "OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 15, no. 1 (January 10, 2021): 25–33. http://dx.doi.org/10.47111/jti.v15i1.1910.

Повний текст джерела
Анотація:
The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Firmansyah, Firmansyah, Rachmat Adi Purnama, and Rachmawati Darma Astuti. "OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 15, no. 1 (January 10, 2021): 25–33. http://dx.doi.org/10.47111/jti.v15i1.1910.

Повний текст джерела
Анотація:
The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Yang, Bin, Ren Yi Fu, Jian Zhong Diao, and Hui Rong Liu. "Security Mechanisms Analysis for ZigBee Standard Based on AES-CCM*." Advanced Materials Research 468-471 (February 2012): 1359–62. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1359.

Повний текст джерела
Анотація:
The security of wireless sensor networks is very important. ZigBee technology offers an optional security system to ensure the wireless sensor network runs safely and reliably. This article analysis of the ZigBee security mechanisms, key management, encryption algorithm and its data integrity mechanism, ZigBee security based on the CCM* mode of the AES-128, has several security scheme, which is a relatively reliable wireless sensor network standard.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Itani, Wassim, Ayman Kayssi, and Ali Chehab. "Wireless Body Sensor Networks." International Journal of Reliable and Quality E-Healthcare 5, no. 2 (April 2016): 1–30. http://dx.doi.org/10.4018/ijrqeh.2016040101.

Повний текст джерела
Анотація:
In this paper, the authors provide a detailed overview and technical discussion and analysis of the latest research trends in securing body sensor networks. The core of this work aims at: (1) identifying the resource limitations and energy challenges of this category of wireless sensor networks, (2) considering the life-critical applications and emergency contexts that are encompassed by body sensor network services, and (3) studying the effect of these peculiarities on the design and implementation of rigorous and efficient security algorithms and protocols. The survey discusses the main advancements in the design of body sensor network cryptographic services (key generation and management, authentication, confidentiality, integrity, and privacy) and sheds the light on the prominent developments achieved in the field of securing body sensor network data in Cloud computing architectures. The elastic virtualization mechanisms employed in the Cloud, as well as the lucrative computing and storage resources available, makes the integration of body sensor network applications, and Cloud platforms a natural choice that is packed with various security and privacy challenges. The work presented in this paper focuses on Cloud privacy and integrity mechanisms that rely on tamper-proof hardware and energy-efficient cryptographic data structures that are proving to be well-suited for operation in untrusted Cloud environments. This paper also examines two crucial design patterns that lie at the crux of any successful body sensor network deployment which are represented in: (1) attaining the right balance between the degree, complexity, span, and strength of the cryptographic operations employed and the energy resources they consume. (2) Achieving a feasible tradeoff between the privacy of the human subject wearing the body sensor network and the safety of this subject. This is done by a careful analysis of the medical status of the subject and other context-related information to control the degree of disclosure of sensitive medical data. The paper concludes by presenting a practical overview of the cryptographic support in the main body sensor network development frameworks such and TinyOS and SPINE and introduces a set of generalized guideline patterns and recommendations for designing and implementing cryptographic protocols in body sensor network environments.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Rode, Mrs K. N. "Network Security and Cyber Security: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3404–7. http://dx.doi.org/10.22214/ijraset.2022.44501.

Повний текст джерела
Анотація:
Abstract: Secure Network has now become a need of any organization. The security threats are increasing day by day and making high speed wired/wireless network and internet services, insecure and unreliable. Now – a - days security measures works more importantly towards fulfilling the cutting edge demands of today’s growing industries. The need is also induced in to the areas like defense, where secure and authenticated access of resources are the key issues related to information security. In this paper Author has described the important measures and parameters regarding large industry/organizational requirements for establishing a secure network. Wi-Fi networks are very common in providing wireless network access to different resources and connecting various devices wirelessly. There are need of different requirements to handle Wi-Fi threats and network hacking attempts. This paper explores important security measures related to different network scenarios, so that a fully secured network environment could be established in an organization. Author also has discussed a case study to illustrate the minimal set of measures required for establishing network security in any organization. We will be analyzing a variety of cyber-attacks and different security methods. We aspire to create research into the subject area. This paper explores how cybercrime has become a serious threat in our lives and we are going to look at a few of the different security methods that are being used in this arena and their various weaknesses.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Prodanovic, Radomir, and Dejan Simic. "Holistic approach to Wep protocol in securing wireless network infrastructure." Computer Science and Information Systems 3, no. 2 (2006): 97–113. http://dx.doi.org/10.2298/csis0602097p.

Повний текст джерела
Анотація:
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication confidentiality and integrity. The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparison to the previous security solutions. A proposal of possible security improvements of RSNA (Robust Security Network Association) is presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії