To see the other types of publications on this topic, follow the link: Wireless sensor network security.

Dissertations / Theses on the topic 'Wireless sensor network security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Wireless sensor network security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Bekara, Chakib. "Wireless sensor network security." Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0020.

Full text
Abstract:
Durant ces dernières années, l’utilisation des réseaux de capteurs sans fils (RCSF), est devenu très répandue. Les capteurs sont habituellement déployés dans une région, pour suivre un phénomène d’intérêt (température, pression, mouvement, présence, radiation, etc,), puis rapporter son évolution à une station de base, qui prendra alors des décisions dépendant des données collectées. Vu que les capteurs sont très limités en termes de ressource (CPU, stockage, énergie), qu’ils sont une proie facile aux compromissions, qu’ils fonctionnent sans assistance humaine, et peuvent être déployés dans des
APA, Harvard, Vancouver, ISO, and other styles
2

Elgaber, Adel. "Security / energy compromise in wireless sensor network." Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2054.

Full text
Abstract:
L’utilisation des réseaux de capteurs offre de nouvelles perspectives dans de nombreux domaines (médecine, militaire, etc.). Les données récoltées par ces capteurs circulent en clair sur les réseaux de capteurs et peuvent être interceptées par un espion. Selon le domaine d’utilisation, le niveau de sécurité souhaité peut être élevé, ce qui peut provoquer une hausse de la consommation d’énergie sur les nœuds. Ces deux contraintes, sécurité et énergie, sont difficilement conciliables. Il y a donc un compromis à trouver entre l’économie d’énergie qui va conditionner la durée de vie du réseau, et
APA, Harvard, Vancouver, ISO, and other styles
3

Tian, Biming. "Key management for wireless sensor network security." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1157.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have attracted great attention not only in industry but also in academia due to their enormous application potential and unique security challenges. A typical sensor network can be seen as a combination of a number of low-cost sensor nodes which have very limited computation and communication capability, memory space, and energy supply. The nodes are self-organized into a network to sense or monitor surrounding information in an unattended environment, while the self-organization property makes the networks vulnerable to various attacks.Many cryptographic mechan
APA, Harvard, Vancouver, ISO, and other styles
4

Abuaitah, Giovani Rimon. "Trusted Querying over Wireless Sensor Networks and Network Security Visualization." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1240163119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tran-Thi-Thuy, Trang. "Secure data aggregation for wireless sensor network." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10912.

Full text
Abstract:
Like conventional networks, security is also a big concern in wireless sensor networks. However, security in this type of networks faces not only typical but also new challenges. Constrained devices, changing topology or susceptibility to unprecedented security threats such as node capture and node compromise has refrained developers from applying conventional security solutions into wireless sensor networks. Hence, developing security solutions for wireless sensor networks not only requires well security analysis but also offers a low power and processing consuming.In this thesis, we implem
APA, Harvard, Vancouver, ISO, and other styles
6

Vepanjeri, Lokanadha Reddy Sasi Kiran. "Data Security in Unattended Wireless Sensor Networks." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/23646.

Full text
Abstract:
In traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deploy
APA, Harvard, Vancouver, ISO, and other styles
7

Iwendi, Celestine O. "Security techniques and implementation for wireless sensor network nodes." Thesis, University of Aberdeen, 2012. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=195992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Radmand, Pedram. "An architecture framework for enhanced wireless sensor network security." Thesis, Curtin University, 2012. http://hdl.handle.net/20.500.11937/2095.

Full text
Abstract:
This thesis develops an architectural framework to enhance the security of Wireless Sensor Networks (WSNs) and provides the implementation proof through different security countermeasures, which can be used to establish secure WSNs, in a distributed and self-healing manner. Wireless Sensors are used to monitor and control environmental properties such as sound, acceleration, vibration, air pollutants, and temperature. Due to their limited resources in computation capability, memory and energy, their security schemes are susceptible to many kinds of security vulnerabilities. This thesis investi
APA, Harvard, Vancouver, ISO, and other styles
9

Shankar, Sonu. "Parameter assignment for improved connectivity and security in randomly deployed wireless sensor networks via hybrid omni/uni-directional antennas." Thesis, [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ren, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Harbin, James R. "Security strategies in wireless sensor networks." Thesis, University of York, 2011. http://etheses.whiterose.ac.uk/2103/.

Full text
Abstract:
This thesis explores security issues in wireless sensor networks (WSNs), and network-layer countermeasures to threats involving routing metrics. Before WSNs can mature to the point of being integrated into daily infrastructure, it is vital that the sensor network technologies involved become sufficiently mature and robust against malicious attack to be trustworthy. Although cryptographic approaches and dedicated security modules are vital, it is important to employ defence in depth via a suite of approaches. A productive approach is to integrate security awareness into the network-layer delive
APA, Harvard, Vancouver, ISO, and other styles
12

CHENG, YI. "Security Mechanisms for Mobile Ad Hoc and Wireless Sensor Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1212076752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Murukesvan, Abhinash. "Distributed Overlays in Wireless Sensor Networks." Thesis, KTH, Kommunikationssystem, CoS, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92202.

Full text
Abstract:
This thesis investigates two architectures and compares their suitability for selective application and user differentiation in sensor networks. A hierarchical architecture consisting of more capable cluster heads surrounded by weaker nodes is compared to a flat architecture of equally powerful nodes. In both architectures there exists a logical overlay network that connects the nodes, depending on the application and user. Furthermore, a broadcast encryption scheme is proposed to aid in distributing keys to nodes for secure communication and to maintain these restricted groups.<br>applikation
APA, Harvard, Vancouver, ISO, and other styles
14

Gaur, Amit. "Secured Communication in Wireless Sensor Network (WSN) and Authentic Associations in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1282053086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ramotsoela, Tsotsope Daniel. "Data aggregation using homomorphic encryption in wireless sensor networks." Diss., University of Pretoria, 2015. http://hdl.handle.net/2263/61330.

Full text
Abstract:
Wireless sensor networks have become increasingly popular in many applications such as environment monitoring and law enforcement. Data aggregation is a method used to reduce network traffic but cannot be used together with conventional encryption schemes because it is not secure and introduces extra overhead. Homomorphic encryption is an encryption scheme that allows data processing on encrypted data as opposed to plaintext. It has the benefit that each intermediate node does not have to decrypt each packet, but the resulting cyphertext is usually much larger than the original plaintext. This
APA, Harvard, Vancouver, ISO, and other styles
16

García, Pineda Miguel. "A group-based architecture and protocol for wireless sensor networks." Doctoral thesis, Universitat Politècnica de València, 2013. http://hdl.handle.net/10251/27599.

Full text
Abstract:
There are many works related to wireless sensor networks (WSNs) where authors present new protocols with better or enhanced features, others just compare their performance or present an application, but this work tries to provide a different perspective. Why don¿t we see the network as a whole and split it into groups to give better network performance regardless of the routing protocol? For this reason, in this thesis we demonstrate through simulations that node¿s grouping feature in WSN improves the network¿s behavior. We propose the creation of a group-based architecture, wher
APA, Harvard, Vancouver, ISO, and other styles
17

Zia, Tanveer. "A Security Framework for Wireless Sensor Networks." University of Sydney, 2008. http://hdl.handle.net/2123/2258.

Full text
Abstract:
Doctor of Philosophy (PhD)<br>Sensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes etc. However, wireless sensor networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. Though there has
APA, Harvard, Vancouver, ISO, and other styles
18

Alarifi, Abdulrahman S. N. "Security through diversity for wireless sensor networks." Related electronic resource:, 2007. http://proquest.umi.com/pqdweb?did=1342747901&sid=1&Fmt=2&clientId=3739&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bagci, Ibrahim Ethem. "Novel security mechanisms for wireless sensor networks." Thesis, Lancaster University, 2016. http://eprints.lancs.ac.uk/78074/.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are used for critical applications such as health care, traffic management or plant automation. Thus, we depend on their availability, and reliable, resilient and accurate operation. It is therefore essential that these systems are protected against attackers who may intend to interfere with operations. Existing security mechanisms cannot always be directly transferred to the application domain of WSNs, and in some cases even novel methods are desirable to give increased protection to these systems. The aim of the work presented in this thesis is to augment secu
APA, Harvard, Vancouver, ISO, and other styles
20

TIBERTI, WALTER. "A Security Framework for Wireless Sensor Networks." Doctoral thesis, Università degli Studi dell'Aquila, 2020. http://hdl.handle.net/11697/157442.

Full text
Abstract:
Wireless Sensor Networks (WSN ) are networks composed of small, wireless, battery-powered and sensor- equipped nodes, called motes. Thank to their characteristics, WSNs are often adopted as monitoring plat- forms in environments where the deployment of conventional networks are unfeasible. Typical applications of WSNs can be found in the smart home scenarios, in industrial applications, in safety-related and in military contexts. The reference protocol stack for WSNs is the IEEE 802.15.4 [1], which defines the first two layers of the ISO/OSI network stack (PHY and MAC). Providing security in W
APA, Harvard, Vancouver, ISO, and other styles
21

Huang, An-Lun. "Security primitives for ultra-low power sensor nodes in wireless sensor networks." Diss., University of Pretoria, 2007. http://hdl.handle.net/2263/24343.

Full text
Abstract:
The concept of wireless sensor network (WSN) is where tiny devices (sensor nodes), positioned fairly close to each other, are used for sensing and gathering data from its environment and exchange information through wireless connections between these nodes (e.g. sensor nodes distributed through out a bridge for monitoring the mechanical stress level of the bridge continuously). In order to easily deploy a relatively large quantity of sensor nodes, the sensor nodes are typically designed for low price and small size, thereby causing them to have very limited resources available (e.g. energy, pr
APA, Harvard, Vancouver, ISO, and other styles
22

Alfayez, Fayez. "A wireless sensor network system for border security and crossing detection." Thesis, Manchester Metropolitan University, 2015. http://e-space.mmu.ac.uk/615894/.

Full text
Abstract:
The protection of long stretches of countries’ borders has posed a number of challenges. Effective and continuous monitoring of a border requires the implementation of multi-surveillance technologies, such as Wireless Sensor Networks (WSN), that work as an integrated unit to meet the desired goals. The research presented in this thesis investigates the application of topologically Linear WSN (LWSNs) to international border monitoring and surveillance. The main research questions studied here are: What is the best form of node deployment and hierarchy? What is the minimum number of sensor nodes
APA, Harvard, Vancouver, ISO, and other styles
23

Gill, Khusvinder. "Enhancing the security of wireless sensor network based home automation systems." Thesis, Loughborough University, 2009. https://dspace.lboro.ac.uk/2134/5951.

Full text
Abstract:
Home automation systems (HASs)seek to improve the quality of life for individuals through the automation of household devices. Recently, there has been a trend, in academia and industry, to research and develop low-cost Wireless Sensor Network (WSN) based HASs (Varchola et al. 2007). WSNs are designed to achieve a low-cost wireless networking solution, through the incorporation of limited processing, memory, and power resources. Consequently, providing secure and reliable remote access for resource limited WSNs, such as WSN based HASs, poses a significant challenge (Perrig et al. 2004). This t
APA, Harvard, Vancouver, ISO, and other styles
24

Bayou, Lyes. "Assessment and enforcement of wireless sensor network-based SCADA systems security." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0083/document.

Full text
Abstract:
La sécurité des systèmes de contrôle industriel est une préoccupation majeure. En effet, ces systèmes gèrent des installations qui jouent un rôle économique important. En outre, attaquer ces systèmes peut non seulement entraîner des pertes économiques, mais aussi menacer des vies humaines. Par conséquent, et comme ces systèmes dépendent des données collectées, il devient évident qu’en plus des exigences de temps réel, il est important de sécuriser les canaux de communication entre ces capteurs et les contrôleurs principaux. Ces problèmes sont plus difficiles à résoudre dans les réseaux de capt
APA, Harvard, Vancouver, ISO, and other styles
25

Mouton, Francois. "Digital forensic readiness for wireless sensor network environments." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.

Full text
Abstract:
The new and upcoming field of wireless sensor networking is unfortunately still lacking in terms of both digital forensics and security. All communications between different nodes (also known as motes) are sent out in a broadcast fashion. These broadcasts make it quite difficult to capture data packets forensically and, at the same time, retain their integrity and authenticity. The study presents several attacks that can be executed successfully on a wireless sensor network, after which the dissertation delves more deeply into the flooding attack as it is one of the most difficult attacks to a
APA, Harvard, Vancouver, ISO, and other styles
26

Mihajlovic, Bojan. "Compression and security platform for the testing of wireless sensor network nodes." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18820.

Full text
Abstract:
This thesis considers the in-field testing of wireless sensor network (WSN) nodes as a means of providing increased network uptime. Such nodes operate with strict limits on energy, cost, computing power, and are prone to attack. While testing through software-based self-test (SBST) programs has advantages on WSN nodes, energy efficiency can be increased by compressing SBST programs before distributing them. Of several compression schemes considered for the task, the BSTW algorithm with Rice coding demonstrates node energy savings while providing a low memory footprint and good compression rati
APA, Harvard, Vancouver, ISO, and other styles
27

Almalkawi, Islam. "Wireless multimedia sensor networks, security and key management." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/129557.

Full text
Abstract:
Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well as scalar sensor data. WMSNs are able to deliver multimedia content due to the availability of inexpensive CMOS cameras and microphones coupled with the significant progress in distributed signal processing and multimedia source coding techniques. These mentioned characteristics, challenges, and requirements of designing WMSNs open many research issues and future research d
APA, Harvard, Vancouver, ISO, and other styles
28

Fötschl, Christine, and Stefan Rainer. "Security versus Power Consumption in Wireless Sensor Networks." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-288.

Full text
Abstract:
<p>X3 C is a Swedish company which develops a world wide good tracking system by using ARFID </p><p>tags placed on every item which has to be delivered and base stations as gateway in a wireless </p><p>sensor network. The requirement of a long lifespan of their ARFID tags made it difficult to </p><p>implement security. Firstly an evaluation of possible security mechanisms and their power </p><p>consumption was done by measuring the avalanche effect and character frequency of the sym- </p><p>metric algorithms Blowfish, RC2 and XTEA. Secondly, the required CPU time which is needed </p><p>by each
APA, Harvard, Vancouver, ISO, and other styles
29

Crosby, Garth Valentine. "Trust Based Security Mechanisms for Wireless Sensor Networks." FIU Digital Commons, 2007. http://digitalcommons.fiu.edu/etd/61.

Full text
Abstract:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to addres
APA, Harvard, Vancouver, ISO, and other styles
30

Chung, Antony. "Efficient authentication in high security wireless sensor networks." Thesis, Lancaster University, 2011. http://eprints.lancs.ac.uk/90107/.

Full text
Abstract:
Wireless sensor networks (WSNs) promise to greatly enhance and simplify the collection of sensor data in many applications. Individually, nodes are relatively limited, with minimalist computational power, communication bandwidth and energy. Lots of effort continues to be made to manage these limitations whilst providing a powerful overall system. Unfortunately, these limitations and solutions introduce new security challenges that must be solved. This work enhances authentication in WSNs for high security scenarios. A review of available security solutions for wireless sensor networks found an
APA, Harvard, Vancouver, ISO, and other styles
31

Engvall, Christoffer. "Security in Wireless Sensor Networks for Open Controller." Thesis, Linköpings universitet, Databas och informationsteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-91089.

Full text
Abstract:
In this thesis we develop, evaluate and implement a security solution for Open Controllers wireless sensor network platform. A scenario is used to describe an exemplar application showing how our system is supposed to function. The security of the platform is analyzed using a well-established threat modeling process and attack trees which result in the identification of a number of risks, which could be security weaknesses. These attack trees visualize the security weaknesses in an easy to access way even for individuals without special security expertise. We develop a security solution to cou
APA, Harvard, Vancouver, ISO, and other styles
32

Bechkit, Walid. "Security and energy saving in wireless sensor networks." Compiègne, 2012. http://www.theses.fr/2012COMP2045.

Full text
Abstract:
Les réseaux de capteurs sans fil (RCSF) présentent de nos jours des avantages indéniables dans plusieurs domaines. Compte tenu des champs d'application critiques d'une part et des limitations de ressources (énergie. Mémoire, etc. ) d'autre part, un compromis doit être trouvé entre la sécurité ct l'efficacité dans ces réseaux. C'est dans ce cadre que s'inscrit cette thèse qui s'attaque à ces deux volets majeurs des RCSF: la sécurité et l'efficacité énergétique. Dans le premier volet, nous nous sommes intéressés à la gestion de clés, une brique de base pour les autres services de sécurité. Nous
APA, Harvard, Vancouver, ISO, and other styles
33

Arisar, Sana Hoor. "Optimizing localization security for scalable wireless sensor networks." Thesis, University of Leeds, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.531424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Nurellari, Edmond. "Distributed detection and estimation in wireless sensor networks : resource allocation, fusion rules, and network security." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/17669/.

Full text
Abstract:
This thesis addresses the problem of detection of an unknown binary event. In particular, we consider centralized detection, distributed detection, and network security in wireless sensor networks (WSNs). The communication links among SNs are subject to limited SN transmit power, limited bandwidth (BW), and are modeled as orthogonal channels with path loss, flat fading and additive white Gaussian noise (AWGN). We propose algorithms for resource allocations, fusion rules, and network security. In the first part of this thesis, we consider the centralized detection and calculate the optimal tran
APA, Harvard, Vancouver, ISO, and other styles
35

Chellappan, Sriram. "On deployment and security in mobile wireless sensor networks." Columbus, Ohio : Ohio State University, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1195662143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Raymond, David Richard. "Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26629.

Full text
Abstract:
As wireless sensor platforms become less expensive and more powerful, the promise of their wide-spread use for everything from health monitoring to military sensing continues to increase. Like other networks, sensor networks are vulnerable to malicious attack; however, the hardware simplicity of these devices makes defense mechanisms designed for traditional networks infeasible. This work explores the denial-of-sleep attack, in which a sensor nodeâ s power supply is targeted. Attacks of this type can reduce sensor lifetime from years to days and can have a devastating impact on a sensor netwo
APA, Harvard, Vancouver, ISO, and other styles
37

Wang, Ke, and 黃岢. "Designing authenication scheme for wireless sensor networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B42841732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Roy, Sankardas. "Secure data aggregation in wireless sensor networks." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3360.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.<br>Vita: p. 124. Thesis directors: Sushil Jajodia, Sanjeev Setia Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Jan. 11, 2009). Includes bibliographical references (p. 120-123). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
39

Matta, Veera Venkata Sudheer. "Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications." Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1604873.

Full text
Abstract:
<p> In the present generation, wireless sensor networks find their application in various fields such as, the building automation systems, body sensor networks, pollution monitoring, earthquake sensing, navigation guidance, temperature, and other variables monitoring where the human intervention is challenging and impossible. The wireless sensor nodes are deployed in different places for the continuous monitoring of the physical parameters of interest and transmit the information to the base station. For any wireless sensor network, data confidentiality, efficiency and data security are the ba
APA, Harvard, Vancouver, ISO, and other styles
40

Tomur, Emrah. "Security And Quality Of Service For Wireless Sensor Networks." Phd thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/12609359/index.pdf.

Full text
Abstract:
Security and quality of service (QoS) issues in cluster-based wireless sensor networks are investigated. The QoS perspective is mostly at application level consisting of four attributes, which are spatial resolution, coverage, system lifetime and packet loss due to collisions. The addressed security aspects are message integrity and authentication. Under this scope, the interactions between security and service quality are analyzed with particular emphasis on the tradeoff between security and spatial resolution for channel capacity. The optimal security and spatial resolution levels which yiel
APA, Harvard, Vancouver, ISO, and other styles
41

Ekonomou, Elias. "Improvements to data transportation security in wireless sensor networks." Thesis, University of Salford, 2010. http://usir.salford.ac.uk/26649/.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are computer networks consisting of miniaturised electronic devices that aim to gather and report information about their environment. The devices are limited in computational, data storage and communication ability. Furthermore, the devices communicate via a wireless, unregulated medium and usually operate on finite power sources. Security in Wireless Sensor Networks is the research area that seeks to provide adequate and energy-efficient security mechanisms for WSNs. Such provision is required in order to increase their range of possible applications and allow
APA, Harvard, Vancouver, ISO, and other styles
42

Kamhoua, Charles A. K. "Modeling Security and Cooperation in Wireless Networks Using Game Theory." FIU Digital Commons, 2011. http://digitalcommons.fiu.edu/etd/436.

Full text
Abstract:
This research involves the design, development, and theoretical demonstration of models resulting in integrated misbehavior resolution protocols for ad hoc networked devices. Game theory was used to analyze strategic interaction among independent devices with conflicting interests. Packet forwarding at the routing layer of autonomous ad hoc networks was investigated. Unlike existing reputation based or payment schemes, this model is based on repeated interactions. To enforce cooperation, a community enforcement mechanism was used, whereby selfish nodes that drop packets were punished not only
APA, Harvard, Vancouver, ISO, and other styles
43

Zhao, Jingjun. "A Two-phase Security Mechanism for Anomaly Detection in Wireless Sensor Networks." Diss., North Dakota State University, 2013. https://hdl.handle.net/10365/26498.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have been applied to a wide range of application areas, including battle fields, transportation systems, and hospitals. The security issues in WSNs are still hot research topics. The constrained capabilities of sensors and the environments in which sensors are deployed, such as hostile and non-reachable areas, make the security more complicated. This dissertation describes the development and testing of a novel two-phase security mechanism for hierarchical WSNs that is capable of defending both outside and inside attacks. For the outside attacks, the attackers a
APA, Harvard, Vancouver, ISO, and other styles
44

Lightfoot, Leonard E. "An energy efficient link-layer security protocol for wireless sensor networks." Diss., Connect to online resource - MSU authorized users, 2006.

Find full text
Abstract:
Thesis (M.S.)--Michigan State University. Dept. of Electrical & Computer Engineering, 2006.<br>Title from PDF t.p. (viewed on Nov. 20, 2008) Includes bibliographical references (p. 49-55). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
45

Ben, Jaballah Wafa. "Securing wireless sensor and vehicular networks." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0013/document.

Full text
Abstract:
Les Réseaux de Capteurs Sans Fils (RCSFs) et les réseaux véhiculaires sont de plus en plus répandus, et déployés dans des domaines d’applications variés tels que la santé, la surveillance environnementale, les applications d’alerte d’accident, et les applications militaires. Cependant, ces réseaux peuvent être sujets à des attaques, ce qui empêche leur utilisation à grande échelle. Cette thèse étudie la sécurité des communications pour les réseaux de capteurs sans fils, et les communications inter-véhiculaires. Dans ce but, nous abordons quatre aspects importants. La première étude porte sur l
APA, Harvard, Vancouver, ISO, and other styles
46

Subramanian, Venkatachalam. "Proximity-based attacks in wireless sensor networks." Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47610.

Full text
Abstract:
The nodes in wireless sensor networks (WSNs) utilize the radio frequency (RF) channel to communicate. Given that the RF channel is the primary communication channel, many researchers have developed techniques for securing that channel. However, the RF channel is not the only interface into a sensor. The sensing components, which are primarily designed to sense characteristics about the outside world, can also be used (or misused) as a communication (side) channel. In our work, we aim to characterize the side channels for various sensory components (i.e., light sensor, acoustic sensor, and a
APA, Harvard, Vancouver, ISO, and other styles
47

Strickland, Fred L. Wang Yu. "Using a helio based protocol in a battlefield sensor network with directional antennas and enhanced security." Auburn, Ala, 2008. http://repo.lib.auburn.edu/EtdRoot/2008/SUMMER/Computer_Science_and_Software_Engineering/Dissertation/Strickland_Fred_14.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Katsis, Grigorios. "Multistage security mechanism for hybrid, large scale wireless sensor networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Jun%5FKatsis.pdf.

Full text
Abstract:
Thesis (M.S. in Applied Physics and M.S. in Electrical Engineering)--Naval Postgraduate School, June 2007.<br>Thesis Advisor(s): Murali Tummala, Gamani Karunasiri. "June 2007." Includes bibliographical references (p. 57-59). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
49

Valero, Marco. "DI-SEC: Distributed Security Framework for Heterogeneous Wireless Sensor Networks." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/cs_diss/66.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are deployed for monitoring in a range of critical domains (e.g., health care, military, critical infrastructure). Accordingly, these WSNs should be resilient to attacks. The current approach to defending against malicious threats is to develop and deploy a specific defense mechanism for a specific attack. However, the problem with this traditional approach to defending sensor networks is that the solution for one attack (i.e., Jamming attack) does not defend against other attacks (e.g., Sybil and Selective Forwarding). This work addresses the challenges with th
APA, Harvard, Vancouver, ISO, and other styles
50

Jin, Xinyu. "Trajectory Privacy Preservation in Mobile Wireless Sensor Networks." FIU Digital Commons, 2013. http://digitalcommons.fiu.edu/etd/983.

Full text
Abstract:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes conti
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!