[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Search published articles ::
Showing 6 results for Wireless Sensor Network

,
Volume 4, Issue 1 (9-2015)
Abstract

Users of wireless sensor networks face difficulties like key distribution. Also there is a large number of keys saved in them. Thus, they tended to use public key cryptography for identification and key agreement. On the other hand, certificate-based public key cryptography makes use of public key infrastructure (PKI). Clearly implementing PKI requires a large amount of memory computations and communications which are impassible for sensor networks. To solve this problem we can use identity based cryptography (IBC). In this type of cryptography, user’s public identities like their IP or email addresses are used as their public key as a result, there will be no need for PKI. After introduction of pairing based cryptography, this type of cryptography was applicable used. In this paper, we will take a look at how to use pairings on wireless sensor networks.


Sayed Mohamamd Tabatabaei Parsa, Hassan Shakeri,
Volume 5, Issue 1 (9-2016)
Abstract

Wireless Sensor Networks (WSNs) are an ideal solution for miscellaneous applications of surveillance and control, such as traffic control, environmental monitoring, and battlefield surveillance. The wireless sensor nodes have limited memory and processing capability. The Sybil Attack is a serious threat in which a malicious node creates multiple fake identities in order to mislead the other sensor nodes. This attack can have influence on routing protocols and the operations like voting and data aggregation. In this paper, we present a dynamic and lightweight algorithm with a confidence-aware trust approach. The Algorithm uses the trust value of each sensor node to reduce the false alarm rates and detect indirect Sybil attacks in WSNs. The simulation results demonstrate that the average detection and wrong detection rates are 92% and 0.08% respectively.


, ,
Volume 6, Issue 1 (9-2017)
Abstract

The use of Wireless Sensors Networks (WSNs) is rapidly growing in the areas of research, application, operation, and commerce. These kind of networks are used for monitoring a desired region of an environment. So, many abilities of these networks, by considering their lower cost, have caused them to be applicable in various areas. WSNs are designed in scale of hundreds to thousands nodes, wherein this great scale is technologically the most challenging issue. One of the most basic and challenging problem is the coverage issue. Security is another important issue. Coverage is the most paramount goal of creating and implementing of WSNs, because coverage is directly related to the degree of quality, method, and durability of the WSNs for recognizing the parameters and defined aims of the regions, and the implementation cost. In this paper, the methods of improving the security of public places (by increasing the coverage of the regions based on the sensors networks) have been investigated.  The results indicate that by choosing an appropriate and optimum coverage, it is possible not only to cover the entire region by utilizing the minimum number of sensors, but also it is possible to increase the security of the monitored places of the network by lesser nodes.
Sayed Mohammad Tabatabaei Parsa, Hassan Shakeri,
Volume 6, Issue 2 (3-2018)
Abstract

Wireless Sensor Networks (WSNs) gather the environmental information via some sensor nodes and send them after some simple processing functions if necessary. These nodes are constrained devices in terms of memory, processing capability, radio range, and energy. Due to the unattended deployment of sensor nodes and the nature of wireless communications, these networks are vulnerable to several attacks. Among these, the Sybil Attack is a serious threat in which a malicious node creates multiple fake identities in order to mislead the other sensor nodes. In this case, the malicious node can attract lots of traffic and disrupt routing protocols. In this paper, we present a confidence-aware trust model considering Time Factor to detect such attacks. In this model, we use the indirect trust, gained from the neighbors' recommendations, in order to detect the indirect Sybil attacks, in which a legal node is not directly associated with the Sybil node. The Algorithm has been implemented using MATLAB. The simulation results demonstrate significant preference of the proposed method in terms of detection accuracy and false alarm rates. The average rate of detection and false detection of the proposed model are 93% and 0.26%.

, ,
Volume 10, Issue 2 (3-2022)
Abstract

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireless sensor network. An authentication scheme in a wireless sensor network must have the following security features: anonymity, Unlink sessions, session key agreement, session key security, and perfect forward secrecy and prevent attacker’s attacks. An important feature of the authentication scheme is that by capturing the sensor, the attacker will not be able to obtain the private values of the protocol parties. Chen et al propose an authentication scheme with key agreement using wireless sensor network for an agricultural monitoring system, which claims to have security features. This articcle proves that Chen et al’s scheme is vulnerable to sensor capture attacks that Obtain session key, sensor impersonation, User anonymity violation, forward and backward secrecy violation, and sessions link. In the rest of the article, the proposed solution to improve the design of Chen et al. will be presented and the improved design will be evaluated.
Amir Allahdadi Ghiyasabadi , Javad Alizadeh,
Volume 11, Issue 1 (9-2022)
Abstract

With the development of new information and communication technologies such as developments related to Internet of Things applications, the importance of information and maintaining its security is more and more considered. Key agreement and authentication protocols play an important role in ensuring information security. One of the important components used in many applications of the Internet of Things is wireless sensor networks, whose security is ensured by using appropriate protocols of these networks. In 2020, Sikarwar and Das presented a key agreement protocol with authentication for wireless sensor networks and claimed that this protocol is secure against well-known attacks such as feedback attacks, password discovery, and man-in-the-middle attacks. In this paper, it is shown that the Sikarvar and DOS protocol is not secure and an attacker can easily obtain this key. In addition, it is shown that the protocol cannot be secure against password discovery and spoofing attacks.


Page 1 from 1     

دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 30 queries by YEKTAWEB 4710