Sensor Network Security Research Papers (original) (raw)

Today's Internet and enterprise networks are so popular as they can easily provide multimedia and ecommerce services to millions of users over the Internet in our daily lives. Since then, security has been a challenging problem in the... more

Today's Internet and enterprise networks are so popular as they can easily provide multimedia and ecommerce services to millions of users over the Internet in our daily lives. Since then, security has been a challenging problem in the Internet's world. That issue is called Cyberwar, in which attackers can aim or raise Distributed Denial of Service (DDoS) to others to take down the operation of enterprises Intranet. Therefore, the need of applying an Intrusion Detection System (IDS) is very important to enterprise networks. In this paper, we propose a smarter solution to detect network anomalies in Cyberwar using Stacking techniques in which we apply three popular machine learning models: k-nearest neighbor algorithm (KNN), Adaptive Boosting (AdaBoost), and Random Decision Forests (RandomForest). Our proposed scheme uses the Logistic Regression method to automatically search for better parameters to the Stacking model. We do the performance evaluation of our proposed scheme o...

Wireless sensor network (WSN) is highly sophisticated than ad hoc wireless network. Ad hoc wireless network is mostly affected by different resources such as high processing energy, storage capabilities and battery backup and etc. Due to... more

Wireless sensor network (WSN) is highly sophisticated than ad hoc wireless network. Ad hoc wireless network is mostly affected by different resources such as high processing energy, storage capabilities and battery backup and etc. Due to the open nature, poor infrastructure, quick deployment practices, and the conflict environments, make them susceptible to a wide range of attacks. Recently, the network attack affects the performance of networks such as network lifetime, throughput, delay, energy consumption, and packet loss. The conventional security mechanisms like intrusion detection system (IDS) of network security are not enough for these networks. In this thesis, we introduce an enhanced intrusion detection and response (EIDR) system using two tire processes. The first contribution of proposed EIDR system is optimal cluster formation and performed by the chaotic ant optimization (CAO) algorithm. The second contribution is to calculate the trust value of each sensor node using the multi objective differential evolution (MODE) algorithm. The computed trust value is used to design the intrusion response action (IRA) system, which offers additional functions and exhibit multiple characteristics of response to mitigate intrusion impacts. The simulation

Wireless sensor network (WSN) is highly sophisticated than ad hoc wireless network. Ad hoc wireless network is mostly affected by different resources such as high processing energy, storage capabilities and battery backup and etc. Due to... more

Wireless sensor network (WSN) is highly sophisticated than ad hoc wireless network. Ad hoc wireless network is mostly affected by different resources such as high processing energy, storage capabilities and battery backup and etc. Due to the open nature, poor infrastructure, quick deployment practices, and the conflict environments, make them susceptible to a wide range of attacks. Recently, the network attack affects the performance of networks such as network lifetime, throughput, delay, energy consumption, and packet loss. The conventional security mechanisms like intrusion detection system (IDS) of network security are not enough for these networks. In this thesis, we introduce an enhanced intrusion detection and response (EIDR) system using two tire processes. The first contribution of proposed EIDR system is optimal cluster formation and performed by the chaotic ant optimization (CAO) algorithm. The second contribution is to calculate the trust value of each sensor node using the multi objective differential evolution (MODE) algorithm. The computed trust value is used to design the intrusion response action (IRA) system, which offers additional functions and exhibit multiple characteristics of response to mitigate intrusion impacts. The simulation

This paper enlightens security features of WSNs (Wireless Sensor Networks) in terms of data confidentiality, data authentication and data integrity. The optimized security protocol has been designed to fulfil utmost prerequisite security... more

This paper enlightens security features of WSNs (Wireless Sensor Networks) in terms of data confidentiality, data authentication and data integrity. The optimized security protocol has been designed to fulfil utmost prerequisite security features for WSNs. Efforts have been made not only to make secure protocol but energy efficient too. The Optimized Security Protocol (OSP) techniques are constituted to abide security requirements for message confidentiality, message authentication and message integrity. Further, proposed OSP design intends a solution that is secure as well as energy efficient. The Rabbit stream cipher has been the main focus for confidentiality provided by our OSP design. Also Rabbit based MAC function is being used extensively for the purpose.

Today's Internet and enterprise networks are so popular as they can easily provide multimedia and ecommerce services to millions of users over the Internet in our daily lives. Since then, security has been a challenging problem in the... more

Today's Internet and enterprise networks are so popular as they can easily provide multimedia and ecommerce services to millions of users over the Internet in our daily lives. Since then, security has been a challenging problem in the Internet's world. That issue is called Cyberwar, in which attackers can aim or raise Distributed Denial of Service (DDoS) to others to take down the operation of enterprises Intranet. Therefore, the need of applying an Intrusion Detection System (IDS) is very important to enterprise networks. In this paper, we propose a smarter solution to detect network anomalies in Cyberwar using Stacking techniques in which we apply three popular machine learning models: k-nearest neighbor algorithm (KNN), Adaptive Boosting (AdaBoost), and Random Decision Forests (RandomForest). Our proposed scheme uses the Logistic Regression method to automatically search for better parameters to the Stacking model. We do the performance evaluation of our proposed scheme o...

Intrusion handling in wireless mesh networks (WMNs) is a relatively less addressed topic. The difficulty may lie in the fact that there are other wireless networks for which some intrusion detection or prevention schemes are proposed that... more

Intrusion handling in wireless mesh networks (WMNs) is a relatively less addressed topic. The difficulty may lie in the fact that there are other wireless networks for which some intrusion detection or prevention schemes are proposed that could also be applied in some way in a WMN setting. As those schemes are contributing, researchers may not find it necessary to specifically focus on this field. Another critical reason may be the difficulty in developing an effective scheme for WMNs. In fact, the structural differences among various wireless ad hoc networking technologies make it imperative to devise the mechanisms in subtle but critically different ways. For WMNs, there is a proper network backbone that is called mesh backbone (which is not present in many other wireless network counterparts), which supports the fringe part or the mesh clients. Hence, it is often possible to install the intrusion handling mechanisms or agents in the stable part and allowing some flexibility in th...

A proposed nonlinear method of sensors data coding allows to increase the useful capacity of the data transmission protocols for Wireless Sensor Networks in 3 – 5 times by the integration of sensors data with different digits capacity and... more

A proposed nonlinear method of sensors data coding allows to increase the useful capacity of the data transmission protocols for Wireless Sensor Networks in 3 – 5 times by the integration of sensors data with different digits capacity and reducing the transmissions number.

Intrusion Detection Systems (IDS) plays a crucial role in the security of modern computer systems and networks. They continuously monitor the activity on a network, looking for any signs of unauthorized access or malicious behavior.... more

Intrusion Detection Systems (IDS) plays a crucial role in the security of modern computer systems and networks. They continuously monitor the activity on a network, looking for any signs of unauthorized access or malicious behavior. Therefore, the main objective of developers is the improvement of Intrusion Detection Systems to control network security. Challenges of Big data in intrusion detection are a struggle that both researchers and developers face due to the decreased scalability of network data. Furthermore, Machine Learning has a crucial role in developing Network Intrusion Detection Systems (NIDS). Ensemble learning is a machine learning technique that combines the predictions of multiple individual models to produce a more accurate and stable prediction. It is considered to be more important than simply learning because it addresses several limitations of simple learning methods. In this work, an ensemble model is proposed to evaluate dimensionality minimization in an Int...

Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for... more

Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of ...

Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for... more

Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of ...

Cryptography is one of the key elements in providing security for modern e‐commerce systems. It is well known that software‐based encryption has built‐in security weaknesses due to storing and managing digital certificates/keys in a... more

Cryptography is one of the key elements in providing security for modern e‐commerce systems. It is well known that software‐based encryption has built‐in security weaknesses due to storing and managing digital certificates/keys in a high‐risk environment such as a local hard disk or software. This makes embedded hardware encryption a superior solution. However, most existing embedded hardware encryption modules need additional dedicated software in order to implement a secure e‐commerce application, which increases cost as well as adds complexity. In this paper, a new embedded hardware DSP (digital signal processor) encryption module, using the RSA (Rivest, Shamir, and Adleman) algorithm, is developed for secure e‐commerce transactions from the client side. The goal is to seamlessly integrate the embedded DSP hardware encryption module, which combines computational power and flexibility in programming, with a widely available web browser that provides the required e‐commerce functio...

Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for... more

Digital watermarking system is a paramount for safeguarding valuable resources and information. Digital watermarks are generally imperceptible to the human eye and ear. Digital watermark can be used in video, audio and digital images for a wide variety of applications such as copy prevention right management, authentication and filtering of internet content. The proposed system is able to protect copyright or owner identification of digital media, such as audio, image, video, or text. The system permutated the watermark and embed the permutated watermark into the wavelet coefficients of the original image by using a key. The key is randomly generated and used to select the locations in the wavelet domain in which to embed the permutated watermark. Finally, the system combines the concept of cryptography and digital watermarking techniques to implement a more secure digital watermarking system.

Wireless Sensor Network (WSN) is a promising technology that has attracted the interest of research in the last decade. Security is one of the fundamental issues in sensor networks since sensor nodes are very resource constrained. An... more

Wireless Sensor Network (WSN) is a promising technology that has attracted the interest of research in the last decade. Security is one of the fundamental issues in sensor networks since sensor nodes are very resource constrained. An attacker may modify, insert, and delete new hardware and software components to the system where a single node, a specific part of the sensing area, and the whole network may become inoperable. Thus, the design of early attack detection and defense mechanisms must be carefully considered. In this chapter, the authors survey attacks and their defense mechanisms in WSNs. Attacks are categorized according to the related protocol layer. They also investigate the open research issues and emerging technologies on security in WSNs.

In a sensor network information from multiple nodes must usually be aggregated in order to accomplish a certain task. A natural way to view this information gathering is in terms of interactions between nodes that are producers of... more

In a sensor network information from multiple nodes must usually be aggregated in order to accomplish a certain task. A natural way to view this information gathering is in terms of interactions between nodes that are producers of information, e.g., those that have collected data, detected events, etc., a nd nodes that are consumers of information, i.e., nodes that seek data of certain types. Our overall goal in this paper is to construct efficient schemes allowing consumer and producer nodes to discover each other so that the desired information can be sent quickly to those who seek it. Here, efficiency is an issue for both the producers (limiting the redundancy of where information is stored) as well as the consumers (keeping the query time low). We introduce the notion of distance-sensitive information brokerage and provide schemes for efficiently bringing together information producers and consumers at a cost proportional to the separation between them—even though the consumers ...

information includes shape and other relevant information necessary for detecting anomalies in the gait or posture of the elderly. Privacy is enhanced because only this abstracted information is transmitted and processed within the... more

information includes shape and other relevant information necessary for detecting anomalies in the gait or posture of the elderly. Privacy is enhanced because only this abstracted information is transmitted and processed within the network. The weakness of the scheme is that it may still be possible to identify individuals using the retained information because gait and posture contain some characteristics which are sufficiently unique to each individual. Hence, the person could be identified from the retained information. Similarly, in the networked sensor tapestry (NeST) architecture [118], the raw sensor data is processed to remove personally identifiable information and the resulting data are communicated to other nodes in the network. Fidaleo et al. [118] offered NeST to facilitate rapid prototyping and deployment of wireless multimedia sensor networks for surveillance applications. The architecture was designed for the secure capture, processing, distribution and archiving of ...

En quoi le reportage immersif propose-il une expérience paradoxale de la réalité et de la vérité dans un contexte marqué par une crise de confiance à l’encontre des médias ? L’immersion appliquée au journalisme propose au spectateur une... more

En quoi le reportage immersif propose-il une expérience paradoxale de la réalité et de la vérité dans un contexte marqué par une crise de confiance à l’encontre des médias ? L’immersion appliquée au journalisme propose au spectateur une expérience subjective de l’information qui associerait émotion, présence et transparence. Les journalistes qui y recourent espèrent que le public se sentira ainsi plus concerné, plus engagé. Mais, à sa manière, le journalisme immersif va au-delà et agirait comme un mode de véridiction qui interroge notre rapport à la réalité à l’ère dite de la « post-vérité ».

A Wireless Sensor Network (WSN) consists of many sensor nodes with low cost and power capability. The nature of WSN makes it easily prone to security attacks and paves way for attackers to easily eavesdrop the network. One of the... more

A Wireless Sensor Network (WSN) consists of many sensor nodes with low cost and power capability. The nature of WSN makes it easily prone to security attacks and paves way for attackers to easily eavesdrop the network. One of the deadliest attack is the Sink Hole attack where the destruction caused to the network becomes inexplicable. It causes the intruder to lure all the packets and drop it, that ultimately will disrupt the sensor networks functionalities. The existing Watchdog mechanism consumes more energy to compute the sink hole node in the network and its trustworthiness also becomes debatable. In this paper, a novel algorithm is developed to improve the existing Watchdog monitoring system for Intrusion Detection to detect the false misbehaving node and elimination of the same. The simulation results show that precise elimination of the malicious node is done. Moreover, a greater percentage reduction in energy consumption is achieved by the proposed method that makes this sys...