Design of Energy Efficient and Secure Algorithms for Sensor Cloud

Design of Energy Efficient and Secure Algorithms for Sensor Cloud

Author: Rajendra Kumar Dwivedi

Publisher: Rajendra Kumar Dwivedi

Published: 2022-11-20

Total Pages: 0

ISBN-13: 9781805458425

DOWNLOAD EBOOK

Sensor cloud is an integration of sensor networks with the cloud to offer a variety of services to the end-users. Applications of this architecture can be seen in various fields such as healthcare information systems, forest fire monitoring systems, smart city, and other Internet-of-Things (IoT) applications. This technology is based on sensor networks; so, energy efficiency becomes one of the prime concerns. The sensed data that are stored in the cloud for further processing in order to get some insights are crucial in many applications; so, security also becomes another important challenge. This motivated us to design some energy-efficient and secure algorithms for the sensor cloud. Security can be implemented in many ways viz., access control, outlier detection, and security against various attacks. In the thesis, we are targeting access control and outlier detection to implement security concerns. We designed one scheme for energy efficiency, one for access control, and two for outlier detection using different approaches. Chapter 3 proposes an energy efficient and fault tolerant scheme for sensor cloud. Wireless Sensor Networks (WSN) find several applications in hard-to-reach areas. As sensors have limited battery power, so, many energy-aware protocols based on negotiation, clustering, and agents have been developed to increase the lifetime of the network. This thesis finds limitations with some multi-agent-based protocols as they place the sink node at the center of the monitoring region which is quite difficult in hard-toreach areas. Therefore, a multi-agent-based energy and fault aware protocol for hard-toreach territories (MAHT) is proposed which uses the technique of Impact Factor to identify a central node with high power capability and dynamic itinerary planning is done to make the protocol fault-tolerant. Its agent migration technique results in improvement of energy efficiency, task completion time, and network lifetime. MAHT is simulated using Castalia simulator, and the impact of payload size, network size, node failures, etc on various performance metrics is analyzed. The proposed protocol outperforms the existing schemes viz., Tree Based Itinerary Design (TBID) and Multiple Mobile Agents with Dynamic Itineraries based Data Dissemination (MMADIDD).


Book Synopsis Design of Energy Efficient and Secure Algorithms for Sensor Cloud by : Rajendra Kumar Dwivedi

Download or read book Design of Energy Efficient and Secure Algorithms for Sensor Cloud written by Rajendra Kumar Dwivedi and published by Rajendra Kumar Dwivedi. This book was released on 2022-11-20 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: Sensor cloud is an integration of sensor networks with the cloud to offer a variety of services to the end-users. Applications of this architecture can be seen in various fields such as healthcare information systems, forest fire monitoring systems, smart city, and other Internet-of-Things (IoT) applications. This technology is based on sensor networks; so, energy efficiency becomes one of the prime concerns. The sensed data that are stored in the cloud for further processing in order to get some insights are crucial in many applications; so, security also becomes another important challenge. This motivated us to design some energy-efficient and secure algorithms for the sensor cloud. Security can be implemented in many ways viz., access control, outlier detection, and security against various attacks. In the thesis, we are targeting access control and outlier detection to implement security concerns. We designed one scheme for energy efficiency, one for access control, and two for outlier detection using different approaches. Chapter 3 proposes an energy efficient and fault tolerant scheme for sensor cloud. Wireless Sensor Networks (WSN) find several applications in hard-to-reach areas. As sensors have limited battery power, so, many energy-aware protocols based on negotiation, clustering, and agents have been developed to increase the lifetime of the network. This thesis finds limitations with some multi-agent-based protocols as they place the sink node at the center of the monitoring region which is quite difficult in hard-toreach areas. Therefore, a multi-agent-based energy and fault aware protocol for hard-toreach territories (MAHT) is proposed which uses the technique of Impact Factor to identify a central node with high power capability and dynamic itinerary planning is done to make the protocol fault-tolerant. Its agent migration technique results in improvement of energy efficiency, task completion time, and network lifetime. MAHT is simulated using Castalia simulator, and the impact of payload size, network size, node failures, etc on various performance metrics is analyzed. The proposed protocol outperforms the existing schemes viz., Tree Based Itinerary Design (TBID) and Multiple Mobile Agents with Dynamic Itineraries based Data Dissemination (MMADIDD).


Secure Sensor Cloud

Secure Sensor Cloud

Author: Vimal Kumar

Publisher: Springer Nature

Published: 2022-05-31

Total Pages: 126

ISBN-13: 3031015274

DOWNLOAD EBOOK

The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.


Book Synopsis Secure Sensor Cloud by : Vimal Kumar

Download or read book Secure Sensor Cloud written by Vimal Kumar and published by Springer Nature. This book was released on 2022-05-31 with total page 126 pages. Available in PDF, EPUB and Kindle. Book excerpt: The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It enables a multi-user on-demand sensory system, where computing, sensing, and wireless network resources are shared among applications. Therefore, it has inherent challenges for providing security and privacy across the sensor cloud infrastructure. With the integration of WSNs with different ownerships, and users running a variety of applications including their own code, there is a need for a risk assessment mechanism to estimate the likelihood and impact of attacks on the life of the network. The data being generated by the wireless sensors in a sensor cloud need to be protected against adversaries, which may be outsiders as well as insiders. Similarly, the code disseminated to the sensors within the sensor cloud needs to be protected against inside and outside adversaries. Moreover, since the wireless sensors cannot support complex and energy-intensive measures, the lightweight schemes for integrity, security, and privacy of the data have to be redesigned. The book starts with the motivation and architecture discussion of a sensor cloud. Due to the integration of multiple WSNs running user-owned applications and code, the possibility of attacks is more likely. Thus, next, we discuss a risk assessment mechanism to estimate the likelihood and impact of attacks on these WSNs in a sensor cloud using a framework that allows the security administrator to better understand the threats present and take necessary actions. Then, we discuss integrity and privacy preserving data aggregation in a sensor cloud as it becomes harder to protect data in this environment. Integrity of data can be compromised as it becomes easier for an attacker to inject false data in a sensor cloud, and due to hop by hop nature, privacy of data could be leaked as well. Next, the book discusses a fine-grained access control scheme which works on the secure aggregated data in a sensor cloud. This scheme uses Attribute Based Encryption (ABE) to achieve the objective. Furthermore, to securely and efficiently disseminate application code in sensor cloud, we present a secure code dissemination algorithm which first reduces the amount of code to be transmitted from the base station to the sensor nodes. It then uses Symmetric Proxy Re-encryption along with Bloom filters and Hash-based Message Authentication Code (HMACs) to protect the code against eavesdropping and false code injection attacks.


Intelligent Internet of Things

Intelligent Internet of Things

Author: Farshad Firouzi

Publisher: Springer Nature

Published: 2020-01-21

Total Pages: 647

ISBN-13: 3030303675

DOWNLOAD EBOOK

This holistic book is an invaluable reference for addressing various practical challenges in architecting and engineering Intelligent IoT and eHealth solutions for industry practitioners, academic and researchers, as well as for engineers involved in product development. The first part provides a comprehensive guide to fundamentals, applications, challenges, technical and economic benefits, and promises of the Internet of Things using examples of real-world applications. It also addresses all important aspects of designing and engineering cutting-edge IoT solutions using a cross-layer approach from device to fog, and cloud covering standards, protocols, design principles, reference architectures, as well as all the underlying technologies, pillars, and components such as embedded systems, network, cloud computing, data storage, data processing, big data analytics, machine learning, distributed ledger technologies, and security. In addition, it discusses the effects of Intelligent IoT, which are reflected in new business models and digital transformation. The second part provides an insightful guide to the design and deployment of IoT solutions for smart healthcare as one of the most important applications of IoT. Therefore, the second part targets smart healthcare-wearable sensors, body area sensors, advanced pervasive healthcare systems, and big data analytics that are aimed at providing connected health interventions to individuals for healthier lifestyles.


Book Synopsis Intelligent Internet of Things by : Farshad Firouzi

Download or read book Intelligent Internet of Things written by Farshad Firouzi and published by Springer Nature. This book was released on 2020-01-21 with total page 647 pages. Available in PDF, EPUB and Kindle. Book excerpt: This holistic book is an invaluable reference for addressing various practical challenges in architecting and engineering Intelligent IoT and eHealth solutions for industry practitioners, academic and researchers, as well as for engineers involved in product development. The first part provides a comprehensive guide to fundamentals, applications, challenges, technical and economic benefits, and promises of the Internet of Things using examples of real-world applications. It also addresses all important aspects of designing and engineering cutting-edge IoT solutions using a cross-layer approach from device to fog, and cloud covering standards, protocols, design principles, reference architectures, as well as all the underlying technologies, pillars, and components such as embedded systems, network, cloud computing, data storage, data processing, big data analytics, machine learning, distributed ledger technologies, and security. In addition, it discusses the effects of Intelligent IoT, which are reflected in new business models and digital transformation. The second part provides an insightful guide to the design and deployment of IoT solutions for smart healthcare as one of the most important applications of IoT. Therefore, the second part targets smart healthcare-wearable sensors, body area sensors, advanced pervasive healthcare systems, and big data analytics that are aimed at providing connected health interventions to individuals for healthier lifestyles.


Certain Power Management Algorithms for Wireless Sensor Networks by Energy Efficient Data Transmission, Security and Node Deployment

Certain Power Management Algorithms for Wireless Sensor Networks by Energy Efficient Data Transmission, Security and Node Deployment

Author: Linoy A Tharakan

Publisher: GRIN Verlag

Published: 2018-02-12

Total Pages: 134

ISBN-13: 3668635242

DOWNLOAD EBOOK

Doctoral Thesis / Dissertation from the year 2017 in the subject Electrotechnology, grade: PhD, , course: Doctor of Philosophy, language: English, abstract: Wireless Sensor Networks (WSNs) is fast emerging as prominent study area that attracting considerable research attention globally. The field has seen tremendous development in design and development of application related interfaces with sensor networks. Sensor network finds applications in several domains such as medical, military, home networks, space and so on. Many researchers strongly believe that WSNs can become as important as the internet in the near future. Just as the internet allows access to digital information anywhere, WSNs could easily provide remote interaction with the physical world. It is going to be the backbone of Ubiquitous Computing (UBICOMP).Through local collaboration among sensors, elimination of duplicate data, participation of relevant nodes in the given task etc. can produce a significant difference in energy conservation, thereby increasing the life time of the sensor network. As the number of nodes increases, data security becomes the most challenging part of the network. The intruders can hack the data any time during processing, transmission or at the receiver end. So, as a popular approach data encryption is the most commendable approach in today’s network. Asymmetric key encryption consumes more energy in processing and so not recommended for WSNs. Symmetric key encryption gives better performance with respect to asymmetric key encryption in WSN applications. It uses less computational power due to relatively effortless mathematical operations, and eventually spends less power. This thesis also proposes a symmetric data encryption through Tabulation method of Boolean function reductionfor the WSNs for secure data transmission. It also suggests a new secure approach, SEEMd, Security Enabled Energy Efficient Middleware algorithmfor the critical data sensing and gives a second chance to the nodes before it falls into to sleep mode for energy management. WSNs are designed for applications which range from small-size healthcare surveillance systems to large-scale agricultural monitoring or environmental monitoring. Thus, any WSN deployment, data aggregation, processing and communication have to assure minimum Quality of Service (QoS) in the network from application to application. In this circumstances, the proposed algorithms in this thesis proved to be efficient and reliable in energy saving and life time enhancement.


Book Synopsis Certain Power Management Algorithms for Wireless Sensor Networks by Energy Efficient Data Transmission, Security and Node Deployment by : Linoy A Tharakan

Download or read book Certain Power Management Algorithms for Wireless Sensor Networks by Energy Efficient Data Transmission, Security and Node Deployment written by Linoy A Tharakan and published by GRIN Verlag. This book was released on 2018-02-12 with total page 134 pages. Available in PDF, EPUB and Kindle. Book excerpt: Doctoral Thesis / Dissertation from the year 2017 in the subject Electrotechnology, grade: PhD, , course: Doctor of Philosophy, language: English, abstract: Wireless Sensor Networks (WSNs) is fast emerging as prominent study area that attracting considerable research attention globally. The field has seen tremendous development in design and development of application related interfaces with sensor networks. Sensor network finds applications in several domains such as medical, military, home networks, space and so on. Many researchers strongly believe that WSNs can become as important as the internet in the near future. Just as the internet allows access to digital information anywhere, WSNs could easily provide remote interaction with the physical world. It is going to be the backbone of Ubiquitous Computing (UBICOMP).Through local collaboration among sensors, elimination of duplicate data, participation of relevant nodes in the given task etc. can produce a significant difference in energy conservation, thereby increasing the life time of the sensor network. As the number of nodes increases, data security becomes the most challenging part of the network. The intruders can hack the data any time during processing, transmission or at the receiver end. So, as a popular approach data encryption is the most commendable approach in today’s network. Asymmetric key encryption consumes more energy in processing and so not recommended for WSNs. Symmetric key encryption gives better performance with respect to asymmetric key encryption in WSN applications. It uses less computational power due to relatively effortless mathematical operations, and eventually spends less power. This thesis also proposes a symmetric data encryption through Tabulation method of Boolean function reductionfor the WSNs for secure data transmission. It also suggests a new secure approach, SEEMd, Security Enabled Energy Efficient Middleware algorithmfor the critical data sensing and gives a second chance to the nodes before it falls into to sleep mode for energy management. WSNs are designed for applications which range from small-size healthcare surveillance systems to large-scale agricultural monitoring or environmental monitoring. Thus, any WSN deployment, data aggregation, processing and communication have to assure minimum Quality of Service (QoS) in the network from application to application. In this circumstances, the proposed algorithms in this thesis proved to be efficient and reliable in energy saving and life time enhancement.


An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks

An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks

Author: Adil Bashir

Publisher: GRIN Verlag

Published: 2021-07-21

Total Pages: 66

ISBN-13: 3346443078

DOWNLOAD EBOOK

Master's Thesis from the year 2013 in the subject Computer Science - Internet, New Technologies, grade: 8.12, , course: M. Tech, language: English, abstract: Wireless sensor network (WSN) is an emerging imperious leading technology of the current century that presents great promise for various pioneering applications. The use of sensor networks should keep developing, mainly in the fields of scientific, logistic, healthcare and military applications. Sensor networks interact and collect sensitive data and operate in unattended hostile environments, thus it is imperative to pay attention to the security of wireless sensor networks as they are highly prone to threats. For successful operation of the nodes, it is important to maintain the security and privacy of the transmitted data as well as the data stored at nodes. The different security protocols and models used in the wired and other wireless networks such as ad-hoc networks cannot be used in WSNs because the sensor size poses significant restrictions, mainly in terms of energy autonomy and node lifetime, as the batteries have to be too tiny. Also, the existing security protocols in these constrained networks are not sufficiently energy efficient, which is the real motivation behind this work. In this thesis, a light-weight dynamic security algorithm titled “An Energy Efficient and Dynamic Security Protocol (EEDSP)” for wireless sensor networks has been proposed and implemented at nodal level. We also implement an existing algorithm and then carry out the performance analysis of both the algorithms in terms of energy consumptions, node lifetime and memory requirements at source and intermediate nodes to verify the improvement in our protocol’s results.


Book Synopsis An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks by : Adil Bashir

Download or read book An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks written by Adil Bashir and published by GRIN Verlag. This book was released on 2021-07-21 with total page 66 pages. Available in PDF, EPUB and Kindle. Book excerpt: Master's Thesis from the year 2013 in the subject Computer Science - Internet, New Technologies, grade: 8.12, , course: M. Tech, language: English, abstract: Wireless sensor network (WSN) is an emerging imperious leading technology of the current century that presents great promise for various pioneering applications. The use of sensor networks should keep developing, mainly in the fields of scientific, logistic, healthcare and military applications. Sensor networks interact and collect sensitive data and operate in unattended hostile environments, thus it is imperative to pay attention to the security of wireless sensor networks as they are highly prone to threats. For successful operation of the nodes, it is important to maintain the security and privacy of the transmitted data as well as the data stored at nodes. The different security protocols and models used in the wired and other wireless networks such as ad-hoc networks cannot be used in WSNs because the sensor size poses significant restrictions, mainly in terms of energy autonomy and node lifetime, as the batteries have to be too tiny. Also, the existing security protocols in these constrained networks are not sufficiently energy efficient, which is the real motivation behind this work. In this thesis, a light-weight dynamic security algorithm titled “An Energy Efficient and Dynamic Security Protocol (EEDSP)” for wireless sensor networks has been proposed and implemented at nodal level. We also implement an existing algorithm and then carry out the performance analysis of both the algorithms in terms of energy consumptions, node lifetime and memory requirements at source and intermediate nodes to verify the improvement in our protocol’s results.


Mobile, Wireless and Sensor Networks

Mobile, Wireless and Sensor Networks

Author: Amine Dahane

Publisher: CRC Press

Published: 2019-07-01

Total Pages: 218

ISBN-13: 1351190741

DOWNLOAD EBOOK

Wireless networking covers a variety of topics involving many challenges. The main concern of clustering approaches for mobile wireless sensor networks (WSNs) is to prolong the battery life of the individual sensors and the network lifetime. For a successful clustering approach, the need of a powerful mechanism to safely elect a cluster head remains a challenging task in many research works that take into account the mobility of the network. In Mobile, Wireless and Sensor Networks: A Clustering Algorithm for Energy Efficiency and Safety, the authors use an approach based on computing of the weight of each node in the network as the proposed technique to deal with this problem. They present a virtual laboratory platform (VLP) of baptized mercury, allowing students and researchers to make practical work (PW) on different aspects of mobile wireless sensor networks. The authors’ choice of WSNs is motivated mainly by the use of real experiments needed in most college courses on WSNs. These usual experiments, however, require an expensive investment and many nodes in the classroom. The platform presented here aims at showing the feasibility, the flexibility, and the reduced cost using the authors’ approach. The authors demonstrate the performance of the proposed algorithms that contribute to the familiarization of the learners in the field of WSNs. The book will be a valuable resource for students in networking studies as well as for faculty and researchers in this area.


Book Synopsis Mobile, Wireless and Sensor Networks by : Amine Dahane

Download or read book Mobile, Wireless and Sensor Networks written by Amine Dahane and published by CRC Press. This book was released on 2019-07-01 with total page 218 pages. Available in PDF, EPUB and Kindle. Book excerpt: Wireless networking covers a variety of topics involving many challenges. The main concern of clustering approaches for mobile wireless sensor networks (WSNs) is to prolong the battery life of the individual sensors and the network lifetime. For a successful clustering approach, the need of a powerful mechanism to safely elect a cluster head remains a challenging task in many research works that take into account the mobility of the network. In Mobile, Wireless and Sensor Networks: A Clustering Algorithm for Energy Efficiency and Safety, the authors use an approach based on computing of the weight of each node in the network as the proposed technique to deal with this problem. They present a virtual laboratory platform (VLP) of baptized mercury, allowing students and researchers to make practical work (PW) on different aspects of mobile wireless sensor networks. The authors’ choice of WSNs is motivated mainly by the use of real experiments needed in most college courses on WSNs. These usual experiments, however, require an expensive investment and many nodes in the classroom. The platform presented here aims at showing the feasibility, the flexibility, and the reduced cost using the authors’ approach. The authors demonstrate the performance of the proposed algorithms that contribute to the familiarization of the learners in the field of WSNs. The book will be a valuable resource for students in networking studies as well as for faculty and researchers in this area.


Handbook On Sensor Networks

Handbook On Sensor Networks

Author: Yang Xiao

Publisher: World Scientific

Published: 2010-08-30

Total Pages: 911

ISBN-13: 9814469122

DOWNLOAD EBOOK

Sensor networks have many interesting applications with great utility; however, their actually deployment and realization rely on continuous innovations and solutions to many challenging problems. Thus, sensor networks have recently attracted the attention of many researchers and practitioners. The compilation of the Handbook on Sensor Networks will meet the demand of the sensor network community for a comprehensive reference and summary of the current state of the area.The Handbook on Sensor Networks is a collection of approximately 40 chapters on sensor network theory and applications. The book spans a wide spectrum and includes topics in medium access control, routing, security and privacy, coverage and connectivity, modeling and simulations, multimedia, energy efficiency, localization and tracking, design and implementation, as well as sensor network applications.


Book Synopsis Handbook On Sensor Networks by : Yang Xiao

Download or read book Handbook On Sensor Networks written by Yang Xiao and published by World Scientific. This book was released on 2010-08-30 with total page 911 pages. Available in PDF, EPUB and Kindle. Book excerpt: Sensor networks have many interesting applications with great utility; however, their actually deployment and realization rely on continuous innovations and solutions to many challenging problems. Thus, sensor networks have recently attracted the attention of many researchers and practitioners. The compilation of the Handbook on Sensor Networks will meet the demand of the sensor network community for a comprehensive reference and summary of the current state of the area.The Handbook on Sensor Networks is a collection of approximately 40 chapters on sensor network theory and applications. The book spans a wide spectrum and includes topics in medium access control, routing, security and privacy, coverage and connectivity, modeling and simulations, multimedia, energy efficiency, localization and tracking, design and implementation, as well as sensor network applications.


Security for Wireless Sensor Networks using Identity-Based Cryptography

Security for Wireless Sensor Networks using Identity-Based Cryptography

Author: Harsh Kupwade Patil

Publisher: CRC Press

Published: 2013-03-21

Total Pages: 235

ISBN-13: 1466581263

DOWNLOAD EBOOK

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.


Book Synopsis Security for Wireless Sensor Networks using Identity-Based Cryptography by : Harsh Kupwade Patil

Download or read book Security for Wireless Sensor Networks using Identity-Based Cryptography written by Harsh Kupwade Patil and published by CRC Press. This book was released on 2013-03-21 with total page 235 pages. Available in PDF, EPUB and Kindle. Book excerpt: Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.


Mission-Oriented Sensor Networks and Systems: Art and Science

Mission-Oriented Sensor Networks and Systems: Art and Science

Author: Habib M. Ammari

Publisher: Springer Nature

Published: 2019-09-18

Total Pages: 820

ISBN-13: 3319911465

DOWNLOAD EBOOK

This book discusses topics in mission-oriented sensor networks and systems research and practice, enabling readers to understand the major technical and application challenges of these networks, with respect to their architectures, protocols, algorithms, and application design. It also presents novel theoretical and practical ideas, which have led to the development of solid foundations for the design, analysis, and implementation of energy-efficient, reliable, and secure mission-oriented sensor network applications. Covering various topics, including sensor node architecture, sensor deployment, mobile coverage, mission assignment, detection, localization, tracking, data dissemination, data fusion, topology control, geometric routing, location privacy, secure communication, and cryptograph, it is a valuable resource for computer scientists, researchers, and practitioners in academia and industry.


Book Synopsis Mission-Oriented Sensor Networks and Systems: Art and Science by : Habib M. Ammari

Download or read book Mission-Oriented Sensor Networks and Systems: Art and Science written by Habib M. Ammari and published by Springer Nature. This book was released on 2019-09-18 with total page 820 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book discusses topics in mission-oriented sensor networks and systems research and practice, enabling readers to understand the major technical and application challenges of these networks, with respect to their architectures, protocols, algorithms, and application design. It also presents novel theoretical and practical ideas, which have led to the development of solid foundations for the design, analysis, and implementation of energy-efficient, reliable, and secure mission-oriented sensor network applications. Covering various topics, including sensor node architecture, sensor deployment, mobile coverage, mission assignment, detection, localization, tracking, data dissemination, data fusion, topology control, geometric routing, location privacy, secure communication, and cryptograph, it is a valuable resource for computer scientists, researchers, and practitioners in academia and industry.


Energy-Efficient Algorithms and Protocols for Wireless Body Sensor Networks

Energy-Efficient Algorithms and Protocols for Wireless Body Sensor Networks

Author: Rongrong Zhang

Publisher: Springer Nature

Published: 2019-08-28

Total Pages: 134

ISBN-13: 3030285804

DOWNLOAD EBOOK

This book provides a systematic treatment of the theoretical foundation and algorithmic tools necessary in the design of energy-efficient algorithms and protocols in wireless body sensor networks (WBSNs). These problems addressed in the book are of both fundamental and practical importance. Specifically, the book delivers a comprehensive treatment on the following problems ranging from theoretical modeling and analysis, to practical algorithm design and optimization: energy-efficient clustering-based leader election algorithms in WBSNs; MAC protocol for duty-cycling WBSNs with concurrent traffic; multi-channel broadcast algorithms in duty-cycling WBSNs; and energy-efficient sleep scheduling algorithms in WBSNs. Target readers of the book are researchers and advanced-level engineering students interested in acquiring in-depth knowledge on the topic and on WBSNs and their applications, both from theoretical and engineering perspective.


Book Synopsis Energy-Efficient Algorithms and Protocols for Wireless Body Sensor Networks by : Rongrong Zhang

Download or read book Energy-Efficient Algorithms and Protocols for Wireless Body Sensor Networks written by Rongrong Zhang and published by Springer Nature. This book was released on 2019-08-28 with total page 134 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides a systematic treatment of the theoretical foundation and algorithmic tools necessary in the design of energy-efficient algorithms and protocols in wireless body sensor networks (WBSNs). These problems addressed in the book are of both fundamental and practical importance. Specifically, the book delivers a comprehensive treatment on the following problems ranging from theoretical modeling and analysis, to practical algorithm design and optimization: energy-efficient clustering-based leader election algorithms in WBSNs; MAC protocol for duty-cycling WBSNs with concurrent traffic; multi-channel broadcast algorithms in duty-cycling WBSNs; and energy-efficient sleep scheduling algorithms in WBSNs. Target readers of the book are researchers and advanced-level engineering students interested in acquiring in-depth knowledge on the topic and on WBSNs and their applications, both from theoretical and engineering perspective.