scispace - formally typeset
Search or ask a question
Author

V. Yin-Man Ma

Bio: V. Yin-Man Ma is an academic researcher from Melbourne Institute of Technology. The author has contributed to research in topics: Wireless Transport Layer Security & Ad hoc wireless distribution service. The author has an hindex of 1, co-authored 1 publications receiving 12 citations.

Papers
More filters
Proceedings ArticleDOI
14 Dec 2004
TL;DR: A new application-layer SPKI/SDSI (simple public key infrastructure/simple distributed security infrastructure) protocol that provides secure communications, authentication and fast re-authentication is proposed.
Abstract: Security in wireless sensor networks is required for trust in the collected data; however, resource limitations have made the security need of secondary importance. The paper proposes a new application-layer SPKI/SDSI (simple public key infrastructure/simple distributed security infrastructure) protocol that provides secure communications, authentication and fast re-authentication. The protocol has been formally proven secure and results indicate the protocol to be suitable for wireless sensor networks.

12 citations


Cited by
More filters
Proceedings ArticleDOI
10 Nov 2011
TL;DR: Demonstrations of a working prototype are provided to show that a digital forensic readiness layer can be added to an existing wireless sensor network, if the prototype adheres to a list of requirements in order to achieve digital Forensic readiness in a wireless Sensor network environment.
Abstract: The field of wireless sensor networking is still a new and upcoming one and, unfortunately, still lacking in terms of digital forensics. All communications between different nodes (also known as motes) are sent out in a broadcast fashion. These broadcasts make it quite difficult to capture data packets forensically whilst retaining integrity and authenticity of the data packets. This paper examines whether and how one can add a digital forensic readiness layer to an existing IEEE 802.15.4 wireless sensor network without any modification to the existing wireless sensor network. This paper also provides demonstrations of a working prototype to show that a digital forensic readiness layer can be added to an existing wireless sensor network, if the prototype adheres to a list of requirements in order to achieve digital forensic readiness in a wireless sensor network environment. This is done by performing several demonstrations which resemble real world wireless sensor network scenarios in order to show that the prototype does indeed add a layer of digital forensic readiness to the existing wireless sensor network.

25 citations

Dissertation
01 Mar 2005
TL;DR: This thesis investigates a novel approach for connecting sensor networks to existing networks: by using the TCP/IP protocol suite in the sensor network, the sensors can be directly connected to an outside network without the need for special proxy servers or protocol converters.
Abstract: Wireless sensor networks are composed of large numbers-up to thousands-of tiny radio-equipped sensors. Every sensor has a small microprocessor with enough power to allow the sensors to autonomously form networks through which sensor information is gathered. Wireless sensor networks makes it possible to monitor places like nuclear disaster areas or volcano craters without requiring humans to be immediately present. Many wireless sensor network applications cannot be performed in isolation; the sensor network must somehow be connected to monitoring and controlling entities. This thesis investigates a novel approach for connecting sensor networks to existing networks: by using the TCP/IP protocol suite in the sensor network, the sensors can be directly connected to an outside network without the need for special proxy servers or protocol converters. Bringing TCP/IP to wireless sensor networks is a challenging task, however. First, because of their limited physical size and low cost, sensors are severely constrained in terms of memory and processing power. Traditionally, these constraints have been considered too limiting for a sensor to be able to use the TCP/IP protocols. In this thesis, I show that even tiny sensors can communicate using TCP/IP. Second, the harsh communication conditions make TCP/IP perform poorly in terms of both throughput and energy efficiency. With this thesis, I suggest a number of optimizations that are intended to increase the performance of TCP/IP for sensor networks. The results of the work presented in this thesis has had a significant impact on the embedded TCP/IP networking community. The software developed as part of the thesis has become widely known in the community. The software is mentioned in books on embedded systems and networking, is used in academic courses on embedded systems, is the focus of articles in professional magazines, is incorporated in embedded operating systems, and is used in a large number of embedded devices.

15 citations

Book ChapterDOI
30 May 2005
TL;DR: This work proposes a service-oriented technically enforceable system that preserves privacy and security for customers transacting with untrusted online vendors and extends to support protection of customer privacy when multiple vendors interact in composite web services.
Abstract: The increasing number of linkable vendor-operated databases present unique threats to customer privacy and security intrusions, as personal information communicated in online transactions can be misused by the vendor. Existing privacy enhancing technologies fail in the event of a vendor operating against their stated privacy policy, leading to loss of customer privacy and security. Anonymity may not be applicable when transactions require identification of participants. We propose a service-oriented technically enforceable system that preserves privacy and security for customers transacting with untrusted online vendors. The system extends to support protection of customer privacy when multiple vendors interact in composite web services. A semi-trusted processor is introduced for safe execution of sensitive customer information in a protected environment and provides accountability in the case of disputed transactions.

12 citations

01 Jan 2006
TL;DR: This paper proposes a distributed authentication model for WSN, and advances the threshold ECDSA authentication scheme in this model, and constructs a new way to choose distributed CA severs of threshold authentication scheme.
Abstract: Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. First, we propose distributed authentication model for WSN, and secondly, advance the threshold ECDSA authentication scheme in this model, finally construct a new way to choose distributed CA severs of threshold authentication scheme. Our simulation results and analysis show that our scheme can reduce effectively bandwidth and computation resources while providing a robust, highly secure and highly available authentication service.

10 citations

Proceedings ArticleDOI
01 Feb 2020
TL;DR: This study has evaluated the threats on WSN and proposed a novel detection algorithm, ready to identify intrusions in real time scenarios progressively situations with a proposition of expansion of future work.
Abstract: Wireless Sensor network is a typical research area, where energy efficiency is a key issue It is popular due to low cost solution and real world problem solving features WSN is also very prone to attack due to the nodes which is resource constraint Security is a vast topic with a lot of aspects and is so much paramount particularly for different types of attacks The architecture of wireless networks is unstable and therefore their orientations transmission is what makes them vulnerable This study has evaluated the threats on WSN; the most common threats are DoS, black hole attack and wormhole attack These attacks generally lead to the data fragments within a network to be replicated or sometimes been destroyed Therefore, there needs to be a detection system that acts as a firewall and that can be able to detect intrusions in real time scenarios In this paper we tended to the most common attacks and proposed a novel detection algorithm, ready to identify intrusions in real time scenarios progressively situations with a proposition of expansion of future work

10 citations