Sensor Network Security Research Papers (original) (raw)

2025, Pervasive and Mobile Computing

2025

In the real military scenarios and particularly using Unmanned Aerial Vehicles (UAVs) that perform aspecific communication task; it is not desirable to have an antenna that covers a wide angle. Omni directional antenna transmits power... more

In the real military scenarios and particularly using Unmanned Aerial Vehicles (UAVs) that perform aspecific communication task; it is not desirable to have an antenna that covers a wide angle. Omni directional antenna transmits power into all directions and thus it gives transmitter benefits of increasing the probability of being detected by hostile receivers. This paper addresses the problem by exploring the security advantagesof using directional antennas in the battlefield. In this respect, we considered a collection of military UAVs that communicates through a wireless link and forms a Mobile AdHoc Network (MANET) using directionalantenna. We develop a security estimation model for each UAV that is capable for calculating the probability of detecting any transmitter in its range. With this model, each UAV can determine the total area in which the probability of detecting hostile transmitter is bigger than zero. Transmission between UAVs will be established using directional ant...

2025, EA Otsapa

Wireless sensor networks deployed in harsh and time-varying radio environments, such as those seen in industrial settings, are susceptible to radio frequency interferences that are not present in conventional wireless sensor networks used... more

Wireless sensor networks deployed in harsh and time-varying radio environments, such as those seen in industrial settings, are susceptible to radio frequency interferences that are not present in conventional wireless sensor networks used for office or home automation. Noise and other wireless interference affect network connectivity and reduce communication channel quality. Furthermore, reliability and latency, which are critical components of industrial communication, suffer. It is difficult to build wireless networks in industrial environments that can coexist with competing wireless devices in an increasingly congested frequency spectrum and are immune to signal interference. To address these difficulties, we must consider the benefits that approaches that have been effective in other application areas can bring to industrial communication. Smart antenna approaches present a viable solution for increasing the interference resistance of industrial wireless sensor networks. Integration of smart antennas into the physical layers of Industrial Wireless Sensor Network (IWSNs) can enable effective signal transmission and reception by devices, which is superior to the omnidirectional antennas now in use. This would reduce interference and boost IWSNs wireless reliability.

2025

The paper deals with problems related to safety analysis of cryptography mechanisms that are applied in the GSM-R system. Within introduction the authors briefly describe necessary background and position of the GSM-R and Euroradio in the... more

The paper deals with problems related to safety analysis of cryptography mechanisms that are applied in the GSM-R system. Within introduction the authors briefly describe necessary background and position of the GSM-R and Euroradio in the European Train Control System. To ensure required safety level, in the context of OSI Reference Model an additional safety layer must be implemented consisting of two sub-layers: Euroradio Safety Layer and Safety Application Interface. The authors address only the former when paying attention to safety analysis of cryptographic mechanisms applied. To demonstrate and verify some of theoretical findings, an experimental part has been involved to show results of the particular attack to the DES algorithm, in this case an attack based on the birthday paradox realised via UML. Any railway infrastructure operator operating in the Central Europe area should endeavour to modernize trans-European corridor lines as fast as possible, with the highest investme...

2025, Springer eBooks

A threat analysis framework and methodology was developed by the authors to catalogue threats, vulnerabilities, attacks and countermeasures for smart cards (contact and contactless) and wireless sensor network node technologies. The goal... more

A threat analysis framework and methodology was developed by the authors to catalogue threats, vulnerabilities, attacks and countermeasures for smart cards (contact and contactless) and wireless sensor network node technologies. The goal of this research was to determine "Security Lessons" learned from the world of smart cards that may be applied to wireless sensor network nodes and vice versa.

2025, International journal of Computer Networks & Communications

With the colossal growth of wireless sensor networks (WSNs) in different applications starting from home automation to military affairs, the pressure on ensuring security in such a network is paramount. Considering the security... more

With the colossal growth of wireless sensor networks (WSNs) in different applications starting from home automation to military affairs, the pressure on ensuring security in such a network is paramount. Considering the security challenges, it is really a hard-hitting effort to develop a secured WSN system. Moreover, as the information technology is getting popular, the intruders are also planning new ideas to break the system security, to harm the network and to make the system quality down with the target of taking the control of the network to corrupt it or to get benefits from it anyway. The intruders corrupt the system only when the security breaking cost (SBC) is lower compared with the benefits they attained or the harm it can make to others. In this paper, the authors define the term "maximizing network interruption problem" and propose a technique, called the grid point approximation algorithm, to estimate the SBC of a multi-hop WSN so that it can be made tougher for an intruder to break the system security. It is assumed that the intruder has the complete picture of the entire network. The technique is designed from the intruder's point of view for completely jamming all the sensor nodes in the network through placing jammers or malicious nodes strategically and at the same time keeping the number of jammer nodes to minimum or near minimum. To the best of the authors' knowledge, there is no work proposed so far of the same kind. Experimental results with the changes of the different network parameters show that the proposed algorithm is able to provide excellent performances to achieve the targets.

2025

As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing... more

As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly susceptible to attacks.. In this paper we present the possible attacks on BSR protocol. One of the most popular and serious attacks in ad hoc networks is wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. A wormhole attack is very powerful, and preventing the attack has proven to be very difficult. In this paper, we devise efficient methods to detect and avoid wormhole attacks in the BSR protocol. The first method namely Reverse Routing Scheme (RRS) attempts to detect the intrusion action .The second technique namely Authentication of Nodes Scheme (ANS) uses cryptographic concepts to detect and prevent wormhole attacks. It not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during routing. The proposed system is designed in Boundary state routing (BSR)protocol and analysis and simulations are performed in network simulator (NS-2).

2024

RADIO COMMUNICATIONS INTERDICTION PROBLEM Türker TANERGÜÇLÜ Ph.D.in Industrial Engineering Advisor: Oya Karaşan Co-Advisor: İbrahim Akgün January 2020 Tactical communications have always played a pivotal role in maintaining effective... more

RADIO COMMUNICATIONS INTERDICTION PROBLEM Türker TANERGÜÇLÜ Ph.D.in Industrial Engineering Advisor: Oya Karaşan Co-Advisor: İbrahim Akgün January 2020 Tactical communications have always played a pivotal role in maintaining effective command and control of troops operating in hostile, extremely fragile and dynamic battlefield environments. Radio communications, in particular, have served as the backbone of the tactical communications over the years and have proven to be very useful in meeting the information exchange needs of widely dispersed and highly mobile military units, especially in the rugged area. Considering the complexity of today’s modern warfare, and in particular the emerging threats from the latest electronic warfare technologies, the need for optimally designed radio communications networks is more critical than ever. Optimized communication network planning can minimize network vulnerabilities to modern threats and provide additional assurance of continued availabil...

2024

Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for... more

Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of ...

2024

In this paper a wormhole detection technique has been proposed which makes use of AODV as an on demand routing protocol and secure neighbor detection protocol with certain modifications. In the technique, sender floods the route request... more

In this paper a wormhole detection technique has been proposed which makes use of AODV as an on demand routing protocol and secure neighbor detection protocol with certain modifications. In the technique, sender floods the route request packets in search of destination and in return the receiver responds by sending the route reply. The route reply contains the number of routes that lead to it, sending and receiving time, the identification of intermediate nodes and the request that the sender had sent. During analyzing the reply, sender confirms the number of routes by sending packets of verification to individual nodes whose identification has been stated by the receiver and based upon the delay in time i.e., ∆t, wormhole link is detected. Analysis proves that the proposed technique not only detects the wormhole link but also provides a verification mechanism to judge the validity of nodes.

2024, VTC Spring 2008 - IEEE Vehicular Technology Conference

Security and efficiency are the two conflicting requirements for all key management schemes operating in the sensor environment. Symmetric key cryptography based schemes adequately use available resources but secure key distribution is a... more

Security and efficiency are the two conflicting requirements for all key management schemes operating in the sensor environment. Symmetric key cryptography based schemes adequately use available resources but secure key distribution is a major problem. Public key cryptography based schemes require enormous resource consumption for making the system effectively secure. This work focuses on presenting public key cryptography based key management scheme as an efficient as well as a secure solution for sensors. A cluster based architecture is used where the base station serves as the key distribution center maintaining public keys for all the nodes in the network. The private keys are to be pre-deployed in all nodes whereas the remaining public key exchanges are achieved via minimal broadcasts. Elliptic curve cryptography is the algorithm used which is light on node resources. Each node stores a minimal number of keys while encryption/decryption operations are also ensured to be cost effective. The approach shows that public key cryptography can match up to the efficiency of symmetric key schemes while providing betterment in security at the same time.

2024, International Conference on Sensor Technologies and Applications

Due to resource constraints and unique features of wireless sensor networks (WSNs), designing a key establishment protocol is much harder for WSNs than for traditional wired and wireless counterparts. In this paper, we propose a new... more

Due to resource constraints and unique features of wireless sensor networks (WSNs), designing a key establishment protocol is much harder for WSNs than for traditional wired and wireless counterparts. In this paper, we propose a new efficient and secure ID-based one-pass authenticated key establishment protocol between an outside user and a sensor node. The proposed protocol does not require sensor nodes to compute any expensive pairing function. Moreover, it imposes very light computational and communication overheads and also provides scalability. We analyze security and efficiency of the proposed protocol by comparing firstly the session key establishment protocols for WSNs and secondly the existing IDbased one-pass key establishment protocols. The comparison shows that the proposed protocol is the most secure and efficient one for WSNs applications providing both security features of user authentication and session key establishment.

2024, Communications of the ACM

They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.

2024

Wireless communications are radically changing the way we communicate and live. While wireless communications for, e.g., computers communications and cellular telephony are a commodity nowadays, another important paradigm (an extension of... more

Wireless communications are radically changing the way we communicate and live. While wireless communications for, e.g., computers communications and cellular telephony are a commodity nowadays, another important paradigm (an extension of the above technologies) is entering our lives, which are wireless sensor networks. In particular human centered networks of this kind are going to play an important role and they are referred to as Wireless Body Area Networks (WBAN), or (when exposing the importance of sensors) as Wireless Medical Sensor Networks (WMSN). Clearly, when these latter networks are used for medical purposes, security and privacy are of utmost importance. And while quite a substantial body of literature nowadays acknowledges this issue, this body remains rather limited as far as complete solutions are concerned. Therefore this paper provides a recap of some relevant papers in this area, and further extends them by exposing the need for the big picture approach to securit...

2024, Proceedings of the 17th International Joint Conference on e-Business and Telecommunications

Since the rise of Big Data, working with large files became the rule and no longer the exception. Despite this fact, some data at-rest encryption modes of operation, namely CBC, are being used even though they do not take into account the... more

Since the rise of Big Data, working with large files became the rule and no longer the exception. Despite this fact, some data at-rest encryption modes of operation, namely CBC, are being used even though they do not take into account the heavy cost of running sequential encryption operations over a big volume of data. This led to some attempts that aim to parallelizing such operations either by only chaining isolated subsets of the plaintext, or by using hash functions to reflect any changes made to the plaintext before running parallel encryption operations. However, we noticed that such solutions present some security issues of different levels of severity. In this paper, we propose a Distributed version of CBC, which we refer to as DCBC, that uses an IV generation layer to ensure some level of chaining between multiple CBC encryption operations that run in parallel, while keeping CPA security intact and even adding new operations such as appending data without compromising the encryption mode's security. We will, also, make a theoretical performance comparison between DCBC and CBC under different circumstances to study optimal conditions for running our proposed mode. We show in this comparison that our solution largely outperforms CBC, when it comes to large files.

2024, World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering

Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry... more

Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.

2024, International journal of Computer Networks & Communications

Today's Internet and enterprise networks are so popular as they can easily provide multimedia and ecommerce services to millions of users over the Internet in our daily lives. Since then, security has been a challenging problem in the... more

Today's Internet and enterprise networks are so popular as they can easily provide multimedia and ecommerce services to millions of users over the Internet in our daily lives. Since then, security has been a challenging problem in the Internet's world. That issue is called Cyberwar, in which attackers can aim or raise Distributed Denial of Service (DDoS) to others to take down the operation of enterprises Intranet. Therefore, the need of applying an Intrusion Detection System (IDS) is very important to enterprise networks. In this paper, we propose a smarter solution to detect network anomalies in Cyberwar using Stacking techniques in which we apply three popular machine learning models: k-nearest neighbor algorithm (KNN), Adaptive Boosting (AdaBoost), and Random Decision Forests (RandomForest). Our proposed scheme uses the Logistic Regression method to automatically search for better parameters to the Stacking model. We do the performance evaluation of our proposed scheme o...

2024, International journal of engineering research and technology

Energy efficiency is the prime concern in Wireless Sensor Network because of the limitations on the power source for the sensor nodes. The proper routing technique can greatly contribute in energy consumption and efficient power... more

Energy efficiency is the prime concern in Wireless Sensor Network because of the limitations on the power source for the sensor nodes. The proper routing technique can greatly contribute in energy consumption and efficient power dissipation in WSNs. Also the packet loss is major problem in the communication process. This paper emphases on energy conservation and secure data communication in a wireless sensor network using multipath routing technique public and private key cryptography. The optimized multipath routing technique deals the aspect to improve security, reliable transmission of data and power consumption. This paper concentrates on securing the data transmission with energy efficient routing. In this technique communication between nodes is setup in three phase path finding, data transmission and path maintenance with data security. For securing the communication this technique uses public cryptography which is initiated by the source node. This authentication and authori...

2024, 2010 International Conference on Computer and Communication Technology (ICCCT)

Sometimes the information, which is transferred during the communication in between sensor node, is very much confidential which is needed to be secure. Since sensor nodes are resource constrained and run on battery, energy consumption... more

Sometimes the information, which is transferred during the communication in between sensor node, is very much confidential which is needed to be secure. Since sensor nodes are resource constrained and run on battery, energy consumption should be low to make it operate for many days. For securing the information various symmetric key encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper is to apply security in sensor network in such a way that it provide confidentiality with authentication using Stream cipher modes of operation, so that the energy consumption will minimizes at the sensor node and the life time of sensor node will increase.

2024, Lecture Notes in Computer Science

In recent years, wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because they are deployed in open and unprotected environment.... more

In recent years, wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because they are deployed in open and unprotected environment. So it is necessary to use effective mechanisms to protect sensor networks against many types of attacks on routing protocols. Intrusion detection is one of the major and efficient defense methods against attacks in a computer network and system. Because of different characteristics of sensor networks, security solutions have to be designed with limited usage of computation and resources. In this paper, we proposed a hybrid, lightweight intrusion detection system integrated for sensor networks. Our intrusion detection scheme take advantage of cluster-based protocol to build a hierarchical network and provide an intrusion framework based both on anomaly and misuse techniques. Our scheme can prevent most of routing attacks on sensor networks.

2024

Secure communications in wireless ad hoc networks are protected by setting up end-to-end secret keys for commu- nicating node pairs. Secret keys can be provided by pre-loading shared secrets (e.g. a set of potential keys or keying... more

Secure communications in wireless ad hoc networks are protected by setting up end-to-end secret keys for commu- nicating node pairs. Secret keys can be provided by pre-loading shared secrets (e.g. a set of potential keys or keying informa- tion) into nodes prior to deployment. However, due to physical limitations of nodes and network scalability requirements, this key pre-distribution approach is not able to achieve full key- connectivity for all communicating pairs. Therefore, on-demand key establishment, in which pairwise secret keys are derived by exchanging multiple keying messages among wireless nodes, becomes necessary. In this paper, we develop a theoretical framework for the on- demand key establishment approach. Our contributions include a novel security metric, which we call a Byzantine resilience vector, to quantify the resilience of any key establishment scheme against Byzantine (arbitrary) attacks. Our analysis shows that previous key establishment schemes are vulnerabl...

2024

Wireless sensor network (WSN) is highly sophisticated than ad hoc wireless network. Ad hoc wireless network is mostly affected by different resources such as high processing energy, storage capabilities and battery backup and etc. Due to... more

Wireless sensor network (WSN) is highly sophisticated than ad hoc wireless network. Ad hoc wireless network is mostly affected by different resources such as high processing energy, storage capabilities and battery backup and etc. Due to the open nature, poor infrastructure, quick deployment practices, and the conflict environments, make them susceptible to a wide range of attacks. Recently, the network attack affects the performance of networks such as network lifetime, throughput, delay, energy consumption, and packet loss. The conventional security mechanisms like intrusion detection system (IDS) of network security are not enough for these networks. In this thesis, we introduce an enhanced intrusion detection and response (EIDR) system using two tire processes. The first contribution of proposed EIDR system is optimal cluster formation and performed by the chaotic ant optimization (CAO) algorithm. The second contribution is to calculate the trust value of each sensor node using the multi objective differential evolution (MODE) algorithm. The computed trust value is used to design the intrusion response action (IRA) system, which offers additional functions and exhibit multiple characteristics of response to mitigate intrusion impacts. The simulation

2024

Wireless sensor network (WSN) is highly sophisticated than ad hoc wireless network. Ad hoc wireless network is mostly affected by different resources such as high processing energy, storage capabilities and battery backup and etc. Due to... more

Wireless sensor network (WSN) is highly sophisticated than ad hoc wireless network. Ad hoc wireless network is mostly affected by different resources such as high processing energy, storage capabilities and battery backup and etc. Due to the open nature, poor infrastructure, quick deployment practices, and the conflict environments, make them susceptible to a wide range of attacks. Recently, the network attack affects the performance of networks such as network lifetime, throughput, delay, energy consumption, and packet loss. The conventional security mechanisms like intrusion detection system (IDS) of network security are not enough for these networks. In this thesis, we introduce an enhanced intrusion detection and response (EIDR) system using two tire processes. The first contribution of proposed EIDR system is optimal cluster formation and performed by the chaotic ant optimization (CAO) algorithm. The second contribution is to calculate the trust value of each sensor node using the multi objective differential evolution (MODE) algorithm. The computed trust value is used to design the intrusion response action (IRA) system, which offers additional functions and exhibit multiple characteristics of response to mitigate intrusion impacts. The simulation

2024, Springer eBooks

In this Master thesis, I will introduce CommSensum, a community sensor network developed by CompNet research group. I will explain what are the needs that led to creating the platform, how is the platform until now and I will focus on the... more

In this Master thesis, I will introduce CommSensum, a community sensor network developed by CompNet research group. I will explain what are the needs that led to creating the platform, how is the platform until now and I will focus on the security issue. As it is a platform that is beginning its first deployment tests, security issues had been sidelined. But now, the first steps need to be done. Therefore, this thesis will analyze the various security options that exist, I will analyze which of these options are able to be adapted to the sensor network environment. Also, I will explain how the main bottleneck to provide of security to this type of platform ithe nodes own hardware limitation. I will analyze two main factors in the system to understand why there is no possibility to use HTTPS, RN171 WiFi module and mote's limitations. In addition I will compare already existing work, how other researchers design different wireless sensor network structures to give a solution. Some tricks can be done having a proxy or a intermediate router. Once immersed in the topic, I will analyze the components of CommSensum and see what security schemes I can develop. Finally, I will also provide the functions needed to implement secure connections between the nodes and the server. All of these function will run on the mote and with its hardware limitations. I will provide too, some function using RSA to use in future in a future Waspmote version or another Arduino board because in the actual version there is not enough SRAM. Finally, I presents some conclusions and future work possible to continuing implementation of the security in CommSensum platform.

2024, HMRIJSTEM

This paper enlightens security features of WSNs (Wireless Sensor Networks) in terms of data confidentiality, data authentication and data integrity. The optimized security protocol has been designed to fulfil utmost prerequisite security... more

This paper enlightens security features of WSNs (Wireless Sensor Networks) in terms of data confidentiality, data authentication and data integrity. The optimized security protocol has been designed to fulfil utmost prerequisite security features for WSNs. Efforts have been made not only to make secure protocol but energy efficient too. The Optimized Security Protocol (OSP) techniques are constituted to abide security requirements for message confidentiality, message authentication and message integrity. Further, proposed OSP design intends a solution that is secure as well as energy efficient. The Rabbit stream cipher has been the main focus for confidentiality provided by our OSP design. Also Rabbit based MAC function is being used extensively for the purpose.

2024, IEEE Journal on Selected Areas in Communications

This paper addresses the issue of mobile target imaging using UWB wireless radar sensor networks (WRSN). The authors describe an architecture for wireless radar sensor networks and a new collaborative mobile target imaging (CMTI)... more

This paper addresses the issue of mobile target imaging using UWB wireless radar sensor networks (WRSN). The authors describe an architecture for wireless radar sensor networks and a new collaborative mobile target imaging (CMTI) algorithm for WRSN. The work aims at accurately and efficiently obtaining an image of mobile targets based on the collaborative effort of deployed radar sensor nodes. CMTI enables detection, tracking, and imaging of mobile targets with a complete WRSN solution. Performance evaluations reveal that CMTI obtains high quality radar images of mobile targets in WRSN with very low communication overhead, and its performance is not affected by the shape and velocity of mobile targets.

2024, International journal of Computer Networks & Communications

Today's Internet and enterprise networks are so popular as they can easily provide multimedia and ecommerce services to millions of users over the Internet in our daily lives. Since then, security has been a challenging problem in the... more

Today's Internet and enterprise networks are so popular as they can easily provide multimedia and ecommerce services to millions of users over the Internet in our daily lives. Since then, security has been a challenging problem in the Internet's world. That issue is called Cyberwar, in which attackers can aim or raise Distributed Denial of Service (DDoS) to others to take down the operation of enterprises Intranet. Therefore, the need of applying an Intrusion Detection System (IDS) is very important to enterprise networks. In this paper, we propose a smarter solution to detect network anomalies in Cyberwar using Stacking techniques in which we apply three popular machine learning models: k-nearest neighbor algorithm (KNN), Adaptive Boosting (AdaBoost), and Random Decision Forests (RandomForest). Our proposed scheme uses the Logistic Regression method to automatically search for better parameters to the Stacking model. We do the performance evaluation of our proposed scheme o...

2024, GJRA - Global Journal for Research Analysis

Intrusion detection system for wireless sensor network is one of the growing research field in recent years. Wireless sensor networks (WSN) consist of tiny devices. These tiny devices have limited energy, computational power, transmission... more

Intrusion detection system for wireless sensor network is one of the growing research field in recent years. Wireless sensor networks (WSN) consist of tiny devices. These tiny devices have limited energy, computational power, transmission range and memory. However, wireless sensor networks are deployed mostly in open and unguarded environment. Therefore, intrusion detection is one of the most important security aspects for wireless sensor networks. There are two types of intrusion detection mechanism: anomaly based and signature based. In this paper, we have tried to set the theoretical foundation of this new research area first, before doing design and implement an Intrusion Detection System (IDS) specifically for sensor networks.

2024, 2010 International Conference on Computer and Communication Technology (ICCCT)

Sometimes the information, which is transferred during the communication in between sensor node, is very much confidential which is needed to be secure. Since sensor nodes are resource constrained and run on battery, energy consumption... more

Sometimes the information, which is transferred during the communication in between sensor node, is very much confidential which is needed to be secure. Since sensor nodes are resource constrained and run on battery, energy consumption should be low to make it operate for many days. For securing the information various symmetric key encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper is to apply security in sensor network in such a way that it provide confidentiality with authentication using Stream cipher modes of operation, so that the energy consumption will minimizes at the sensor node and the life time of sensor node will increase.

2024, SIMULATION

Intrusion handling in wireless mesh networks (WMNs) is a relatively less addressed topic. The difficulty may lie in the fact that there are other wireless networks for which some intrusion detection or prevention schemes are proposed that... more

Intrusion handling in wireless mesh networks (WMNs) is a relatively less addressed topic. The difficulty may lie in the fact that there are other wireless networks for which some intrusion detection or prevention schemes are proposed that could also be applied in some way in a WMN setting. As those schemes are contributing, researchers may not find it necessary to specifically focus on this field. Another critical reason may be the difficulty in developing an effective scheme for WMNs. In fact, the structural differences among various wireless ad hoc networking technologies make it imperative to devise the mechanisms in subtle but critically different ways. For WMNs, there is a proper network backbone that is called mesh backbone (which is not present in many other wireless network counterparts), which supports the fringe part or the mesh clients. Hence, it is often possible to install the intrusion handling mechanisms or agents in the stable part and allowing some flexibility in th...

2024, International Journal of Computer Applications

The most major requirements of wireless networks in the current network context are security, scalability and memory efficiency. Most of the earlier implementations use cryptographic key exchanges alone for imposing security but mostly... more

The most major requirements of wireless networks in the current network context are security, scalability and memory efficiency. Most of the earlier implementations use cryptographic key exchanges alone for imposing security but mostly proved to be less secure with the presence of many attacks like IP-spoofing and masquerading. This is because, the security is present only during communication i.e., only message integrity is ensured and not the user authenticity. Hence we are trying to include an authentication scheme along with the already existing integrity scheme to provide maximum security all through the lifetime of networks. In this paper, we consider different options for providing authentication, analyze them and find which method can be used for producing better results

2024, Springer eBooks

Due to its characteristics, the Wireless Sensor Networks (WSN) are useful in a variety of applications such as environmental monitoring, surveillance, tracking, among others. Given the nature of such applications, where many are mission... more

Due to its characteristics, the Wireless Sensor Networks (WSN) are useful in a variety of applications such as environmental monitoring, surveillance, tracking, among others. Given the nature of such applications, where many are mission critical, the WSN become targets of possible attackers interested in harming the network. Among the defense mechanisms, the intrusion detection systems play important role in detecting attacks that can overcome the preventing techniques. This paper proposes a new collaborative and decentralized approach for intrusion detection system. Special nodes, called monitors, will be responsible for monitoring the behavior of neighbor nodes. The malicious activities evidences discovered by each monitor will be shared and correlated with the purpose of increasing the accuracy in detection of intruders. Experiment conducted by simulation show that our solution is effective in reducing the false positives.

2024, Novel Algorithms and Techniques in Telecommunications and Networking

Due to its characteristics, the Wireless Sensor Networks (WSN) are useful in a variety of applications such as environmental monitoring, surveillance, tracking, among others. Given the nature of such applications, where many are mission... more

Due to its characteristics, the Wireless Sensor Networks (WSN) are useful in a variety of applications such as environmental monitoring, surveillance, tracking, among others. Given the nature of such applications, where many are mission critical, the WSN become targets of possible attackers interested in harming the network. Among the defense mechanisms, the intrusion detection systems play important role in detecting attacks that can overcome the preventing techniques. This paper proposes a new collaborative and decentralized approach for intrusion detection system. Special nodes, called monitors, will be responsible for monitoring the behavior of neighbor nodes. The malicious activities evidences discovered by each monitor will be shared and correlated with the purpose of increasing the accuracy in detection of intruders. Experiment conducted by simulation show that our solution is effective in reducing the false positives.

2024

Immersive virtual reality systems allow people to more realistically experience computer-generated environments. The interaction methods used in these environments affect the usefulness and feeling of immersion. User interaction with the... more

Immersive virtual reality systems allow people to more realistically experience computer-generated environments. The interaction methods used in these environments affect the usefulness and feeling of immersion. User interaction with the environment requires sensors to detect what the user is doing. This information needs to be communicated to the virtual environment. The sensor and communication components used should be lightweight and not hinder the free movement of the user. A fully enclosed environment, such as the C6 at Iowa State University, precludes using a wired system. A wireless sensor network cannot interfere with existing wireless systems such as the trackers. Wireless sensor networks can be bought off the shelf and easily applied to many applications. The nodes tend to be small and low powered with limited processing and communication capabilities. Because of their small size, these wireless communication nodes can be attached to a user to create a custom input device. This thesis implemented a software infrastructure for a wireless sensor network system for interaction in virtual reality environments. The system is implemented using Mica2 Motes for the wireless sensor network and vRJuggler for VR applications. The system provides an easy method to add a variety of sensors. Each communications node collects data from several sensors. The nodes send the data to a computer running a virtual reality application. The application responds to the user based on the collected sensor data. The implementation and example applications are discussed along with the limitations of this approach.

2024, IEEE Transactions on Parallel and Distributed Systems

Continuous aggregation is usually required in many sensor applications to obtain the temporal variation information of aggregates. However, in a hostile environment, the adversary could fabricate false temporal variation patterns of the... more

Continuous aggregation is usually required in many sensor applications to obtain the temporal variation information of aggregates. However, in a hostile environment, the adversary could fabricate false temporal variation patterns of the aggregates by manipulating a series of aggregation results through compromised nodes. Existing secure aggregation schemes conduct one individual verification for each aggregation result, which could incur great accumulative communication cost and negative impact on transmission scheduling for continuous aggregation. In this paper, we identify distinct design issues for protecting continuous in-network aggregation and propose a novel scheme to detect false temporal variation patterns. Compared with the existing schemes, our scheme greatly reduces the verification cost by checking only a small part of aggregation results to verify the correctness of the temporal variation patterns in a time window. A sampling-based approach is used to check the aggregation results, which enables our scheme independent of any particular in-network aggregation protocols as opposed to existing schemes. We also propose a series of security mechanisms to protect the sampling process. Both theoretical analysis and simulations show the effectiveness and efficiency of our scheme.

2024, Journal of Electrical and Computer Engineering

Renewable energy-based local microgrids are gaining popularity despite the unavailability of low-cost, power efficient, and secure communication system for its supervisory control and data acquisition (SCADA) system. This research has... more

Renewable energy-based local microgrids are gaining popularity despite the unavailability of low-cost, power efficient, and secure communication system for its supervisory control and data acquisition (SCADA) system. This research has been carried out to address this issue along with the additional features such as data uploading to a server through a gateway, local data logging, and alerting the concerned crew in case of any fault to minimize the outage time. This paper presents the design of a communication system for the SCADA system of microgrid. ESP32 with LoRa has been used for communication between two nodes or a node and central SCADA unit. Communication security has been achieved by implementing AES cryptography. Data authenticity has been achieved by introducing a unique message authentication code (MAC) for each message. A mesh-like network has been implemented to improve the LoRa range. ESP32 and dragino-uno based LoRa gateways have been tried for uploading the data to t...

2024, 2012 IEEE Fourth International Conference on Technology for Education

this paper proposes a model (architecture and protocol) that will help universities and educational institutions to automate student attendance activity. A client server architecture using cryptography is proposed to log attendance... more

this paper proposes a model (architecture and protocol) that will help universities and educational institutions to automate student attendance activity. A client server architecture using cryptography is proposed to log attendance details in a secure manner. A protocol is devised such that it is hard for students to submit wrong information into the server and very hard for adversary to impersonate.

2024, Computer Networks

Multihop wireless ad hoc and sensor networks open the door for great networking opportunities especially in scenarios where it is infeasible or expensive to deploy significant networking infrastructure. However, the open communication... more

Multihop wireless ad hoc and sensor networks open the door for great networking opportunities especially in scenarios where it is infeasible or expensive to deploy significant networking infrastructure. However, the open communication media and the lack of networking infrastructure make these networks vulnerable to a wide range of security attacks. A particularly devastating attack is the control traffic tunneling attack, where a malicious node records control traffic at one location and tunnels it to a colluding node, possibly far away, which replays it locally. One of the control traffic attacks' incarnations is the wormhole attack that can be used to prevent route establishment by preventing nodes from discovering legitimate routes that are more than two hops away. These attacks have been addressed by many researchers, however, most of the presented work is either limited to static scenarios, require expensive hardware or suffer from high overhead and performance degradation. In this paper, we present a scalable countermeasure for the control traffic tunneling attack, called CTAC, which alleviates these drawbacks and efficiently mitigates the attack in both static and mobile networks. CTAC uses trusted nodes called cluster heads (CH) for global tracking of node locations and profile keeping. Local monitoring is used to detect and isolate malicious nodes locally. Additionally, when sufficient suspicion builds up at a CH, it enforces a global isolation of the malicious node from the whole network. The performance gain, the relatively low overhead, and the positive impact of CTAC on the data traffic fidelity are brought out through analysis and extensive simulation using ns-2. The results show that CTAC achieves higher detection ratio and faster isolation time while considerably decreases the overhead energy and the end-to-end delay compared to the state-of-the art schemes.

2024, 2012 IEEE Fourth International Conference on Technology for Education

this paper proposes a model (architecture and protocol) that will help universities and educational institutions to automate student attendance activity. A client server architecture using cryptography is proposed to log attendance... more

this paper proposes a model (architecture and protocol) that will help universities and educational institutions to automate student attendance activity. A client server architecture using cryptography is proposed to log attendance details in a secure manner. A protocol is devised such that it is hard for students to submit wrong information into the server and very hard for adversary to impersonate.

Architecture for automated student attendance  Figure 1. Student using client program for authentication and attendance logs submission. Client server hand shake includes initiation, data submission, and confirmation followed by closure.

2023, Journal of Independent Studies and Research Computing

This research presents an application of Charge-Coupled Device (CCD) linear sensor and laser diode in an optical tomography system. These optoelectronic sensors are believed to detect solid objects rather than transparent objects. Based... more

This research presents an application of Charge-Coupled Device (CCD) linear sensor and laser diode in an optical tomography system. These optoelectronic sensors are believed to detect solid objects rather than transparent objects. Based on the research results, the development of optical tomography system using CCD and laser diode has helped to enhance the potential of these sensors in detecting low-opacity objects. Experiments for detecting a solid rod, transparent rod and air bubbles in non-flowing crystal clear water were conducted in this study. From the image reconstruction results, it clearly shows a cross-sectional image of a pipeline system with the existence and the exact location of opaque and transparent objects in multiphase flow detected by the orthogonal projection of CCD sensors and lasers. The information details of real-time multiphase flow that observed by this system can be transmit via wireless or wired data communication system.

2023, Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication

2023, Communications of the ACM

They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.

2023, International Journal of Computing

A proposed nonlinear method of sensors data coding allows to increase the useful capacity of the data transmission protocols for Wireless Sensor Networks in 3 – 5 times by the integration of sensors data with different digits capacity and... more

A proposed nonlinear method of sensors data coding allows to increase the useful capacity of the data transmission protocols for Wireless Sensor Networks in 3 – 5 times by the integration of sensors data with different digits capacity and reducing the transmissions number.

2023

Intrusion Detection Systems (IDS) plays a crucial role in the security of modern computer systems and networks. They continuously monitor the activity on a network, looking for any signs of unauthorized access or malicious behavior.... more

Intrusion Detection Systems (IDS) plays a crucial role in the security of modern computer systems and networks. They continuously monitor the activity on a network, looking for any signs of unauthorized access or malicious behavior. Therefore, the main objective of developers is the improvement of Intrusion Detection Systems to control network security. Challenges of Big data in intrusion detection are a struggle that both researchers and developers face due to the decreased scalability of network data. Furthermore, Machine Learning has a crucial role in developing Network Intrusion Detection Systems (NIDS). Ensemble learning is a machine learning technique that combines the predictions of multiple individual models to produce a more accurate and stable prediction. It is considered to be more important than simply learning because it addresses several limitations of simple learning methods. In this work, an ensemble model is proposed to evaluate dimensionality minimization in an Int...

2023, Computer Science and Information Systems

Wireless sensor networks (WSN) have become increasingly popular in monitoring environments such as: disaster relief operations, seismic data collection, monitoring wildlife and military intelligence. The sensor typically consists of... more

Wireless sensor networks (WSN) have become increasingly popular in monitoring environments such as: disaster relief operations, seismic data collection, monitoring wildlife and military intelligence. The sensor typically consists of small, inexpensive, battery-powered sensing devices fitted with wireless transmitters, which can be spatially scattered to form an ad hoc hierarchically structured network. Recently, the global positioning system (GPS) facilities were embedded into the sensor node architecture to identify its location within the operating environment. This mechanism may be exploited to extend the WSN?s applications. To face with the security requirements and challenges in hierarchical WSNs, we propose a dynamic location-aware key management scheme based on the bivariate polynomial key predistribution, where the aggregation cluster nodes can easily find their best routing path to the base station, by containing the energy consumption, storage and computation demands in bo...

2023, International Conference on Autonomic and Autonomous Systems

In an Internet connected world, security represents a priority. This paper discusses a usage scenario of the ElGamal encryption algorithm with k+1 access levels, by generating a hierarchical tree from the private key algorithm. It... more

In an Internet connected world, security represents a priority. This paper discusses a usage scenario of the ElGamal encryption algorithm with k+1 access levels, by generating a hierarchical tree from the private key algorithm. It underlines the effectiveness in data transfer between different agents as nodes in a hierarchical society. An agentbased system was implemented. This structure was generated using as starting point the algorithm underlined above. Also, the context-awareness authentication is discussed considering the fact that system should provide access to encrypted text.

2023

Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for... more

Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of ...

2023

Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for... more

Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of ...

2023, Springer eBooks

On today's open computing platforms, attackers can often extract sensitive data from a program's stack, heap, or files. To address this problem, we designed and implemented a new primitive that helps provide better security for ciphers... more

On today's open computing platforms, attackers can often extract sensitive data from a program's stack, heap, or files. To address this problem, we designed and implemented a new primitive that helps provide better security for ciphers that use keys stored in easily accessible locations. Given a particular symmetric key, our approach generates two functions for encryption and decryption: The short-key function uses the original key, while the functionally equivalent long-key version works with an arbitrarily long key derived from the short key. On common PC architectures, such a long key normally does not fit in stack frames or cache blocks, forcing an attacker to search memory space. Even if extracted from memory, the long key is neither easily compressible nor useful in recovering the short key. Using a pseudorandom generator and additional novel software-protection techniques, we show how to implement this construction securely for AES. Potential applications include whitebox ciphers, DRM schemes, software smartcards, and challenge-response authentication, as well as any scenario where a key of controllable length is useful to enforce desired security properties.

2023

In this paper, we consider security issues arising in the development of the wireless networks without infrastructure, with the rapidly changing composition of the elements of such a network The LEAP Initial Protection (LEAP-IP) protocol... more

In this paper, we consider security issues arising in the development of the wireless networks without infrastructure, with the rapidly changing composition of the elements of such a network The LEAP Initial Protection (LEAP-IP) protocol proposed, which closes the vulnerability of the LEAP at the network initialization stage. Advanced LEAP-IP protocol allows to resist attacks on the radio channel, physical attacks on the device, and is energy efficient, that is especially important for devices with a limited power resource. Also, a classification of selforganizing networks and some variants of using the proposed pairwise authentication protocol is presented.