scispace - formally typeset
Proceedings ArticleDOI

Secure neighbour authentication in wireless sensor networks

TLDR
A secure neighbour authentication protocol based on a variant of HB, an authentication protocol for RFID devices is proposed, and simulation results show that the routing protocol SHLAODV is secure and energy efficient.
Abstract
Applications of wireless sensor networks often include sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Lacking security services in the routing protocols, WSNs are vulnerable to many kinds of attacks. A secure routing in WSN must address several challenges: vulnerable wireless communication, highly resource-constrained senor nodes in terms of processing power, storage, and battery life, and the risk of physically captured. However, a few of existing routing protocols for WSNs have been designed with security as a goal. As sensors communicate in a multi-hop fashion, identification of secure neighbours in a mobile topology is critical for routing. Since these devices are resource constrained, we propose a secure neighbour authentication protocol based on a variant of HB, an authentication protocol for RFID devices. Simulation results show that the routing protocol SHLAODV is secure and energy efficient.

read more

Citations
More filters
Journal ArticleDOI

Secure and robust clustering for quantized target tracking in wireless sensor networks

TL;DR: This work proposes a new method for jointly activating the best group of candidate sensors that participate in data aggregation, detecting the malicious sensors and estimating the target position using quantized variational filtering (QVF) algorithm.
Proceedings ArticleDOI

Detecting Sybil attack based on state information in Underwater Wireless Sensor Networks

TL;DR: This paper puts forward a novel scheme based on state information of nodes to detect the Sybil attack and implements the feature through both by numerical analysis and simulation performance in MATLAB.
Proceedings ArticleDOI

Practical RF fingerprints for Wireless Sensor Network authentication

TL;DR: A physical layer authentication method that uses the physical attributes of OQPSK RF signals transmitted from IEEE 802.15.4 WSN nodes, collecting data with a USRP1 software-defined radio platform is demonstrated.
Journal ArticleDOI

Artificial Landmarks for Trusted Localization of Autonomous Vehicles Based on Magnetic Sensors.

TL;DR: This work proposes an integration process based on Transducer Electronic Data Sheets for artificial landmarks that can be used by passing autonomous vehicles, e.g., UAVs, for re-orientation and re-calibration.

Printable Green RFID Antennas for Embedded Sensors

Yasar Amin
TL;DR: In the recent years, radiofrequency identification (RFID) technology has been widely integrated into modern society applications, ranging from barcode successor to retail supply chain, remote moni... as discussed by the authors.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Journal ArticleDOI

Secure routing in wireless sensor networks: attacks and countermeasures

TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Journal Article

Security for Sensor Networks

TL;DR: This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.
Proceedings ArticleDOI

SPINS: security protocols for sensor networks

TL;DR: A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Related Papers (5)