Wireless sensor networks architecture.

Wireless sensor networks architecture.

Source publication
Article
Full-text available
With regard to the spread of innovative technologies, wireless sensor networks (WSNs) have great research interest in recent years. Although the WSN service is being facilitated, security related accidents are continuously incurring. In particular, many activities between mobile devices and sensor nodes take place without too much of protection of...

Similar publications

Article
Full-text available
With the emergence of multiple technological tools for teaching science such as active boards, mobile devices and tabs, the effectiveness and appropriateness of these tools are yet questionable. Students’ performance in science, especially in the Arab world, is still unsatisfactory as shown by the TIMMS results of 2007 and 2011. In Lebanon, it was...
Conference Paper
Full-text available
This paper presents AREmbody, an augmented-reality mobile application for the development of tonal harmony awareness. Continuing from previous prototypes based on full body and desktop interaction, AREmbody benefits from a very simple portable setup which allows physical interaction and supports the activity of one or more users. The application co...
Article
Full-text available
More and more services require personal information about the user in order to work properly. In this paper we present Mobile E-personality (ME) service that contains such personal information. This information is stored in a single mobile device from where the ME service provides it when required. The structure of the Mobile E-Personality as well...
Article
Full-text available
The paper deals with the analysis of the development of mobile devices and current trends in their use and development. The relevance of the article is in its linking history and present. The article points to milestones in historical development and future trends and development of mobile devices. Today, mobile devices affect all areas of human li...
Article
Full-text available
Contemporary mobile devices continuously interrupt people with notifications in various and changing physical environments. As different places can have different social setting, understanding how disturbing an interruption might be to people around the user is not a straightforward task. To understand how users perceive disturbance in their social...

Citations

... As smart applications have gained considerable momentum, WSN has become an area of enormous interest (Hussein et al., 2019). It is predicted that the growth of the WSN would be over 2 billion dollars by 2020 (Kim and Hong, 2013).In contrast to the traditional communication networks, WSN is characterized by higher unreliability and serve constraints in terms of computational and storage resources. The sensor nodes in WSN are equipped with sensing, processing, and transmitting capabilities. ...
Article
Full-text available
An access control mechanism plays a critical role in new node deployment within a resource-constrained Wireless Sensor Networks. The deployment of a new node is inevitable either due to the outage of power or nodes getting compromised due to the adversary’s attacks. The access control scheme prevents malicious node deployment and also allows a new node to establish a shared key with its neighbors for secure communication. Besides having low communication and computational overheads, an access control mechanism must suffice to specific security and functional requirements for their practical implementations. In this paper, a provable and practical access control scheme based on Elliptical Curve Cryptography (ECC) has been presented. The proposed access control scheme supports node privacy while addressing all other major functional and security requirements. The formal validation of the proposed scheme has been carried out using automated validation of internet security protocols and applications (AVISPA) and Scyther tools. A comparative study of the proposed scheme with the existing schemes has been carried out on various security and functional requirements suggesting a better trade-off. Finally, practical experimentation on TinyOS and MICAz motes has been carried out to provide detailed energy analysis and test-bed implementation of the proposed scheme.
... This is a decent case of how such principles and controls ought to be authorized at a bigger extension if any nation receives the HSN innovation. There are scarce conditions, for instance a medicinal crisis that may require the unveiling of patient wellbeing data to specialists on call [20]. Table1 demonstrates the significant security dangers, security necessities and the conceivable security arrangements when utilizing a WBAN. ...
Article
Human Sensor Network (HSN) is an emerging technology that allows to remotely monitor, gather and maintain the information of patient's health parameters using bio-sensors. The bio-sensors are either implantable or wearable or may be stitched on the clothes of a patient. The collected health information is processed and maintained in a database server. The information from the database can be accessed by the users such as doctors, health servants, government, insurance agencies and by the patient or his relatives. Since, the information collected is related to thepatient's private health record, it is required to be safely stored and protected from an unauthorized access. Thus, Security and Privacy are the key issues in HSNs. In this paper, the infrastructure-based and adhoc-based communication architecture of HSN and challenges and measures of security and privacy issues have been reviewed.
... All this is a good example of how such rules and regulations should be enacted at a larger scope if any country adopts the WBAN technology. There are special conditions, for example a disaster or medical emergency that may require the divulging of patient health information to first responders [30]. Table 1 shows the major security threats, security requirements and the possible security solutions when using a WBAN. ...
Article
Wireless Body Area Network (WBAN) is a new trend in the technology that provides remote mechanism to monitor and collect patient’s health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient’s records are kept safe from intruder’s danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN. Finally, open areas for future research and enhancements are explored.
... Routing Aggregation Packet injection Anonymity/ -anonymity/pseudonymity Statistics [44] x x Anonymity [39] x [30] x x [22] x x [28] -anonymity [25] x x [52] x x [29] x [31] x x Anonymity [21] x [34] Pseudonymity [20] x x [49] x x [53] x [16] x (+ ring signature) Pseudonymity [46] x x [50] Pseudonymity [35] x [54] x [13] (x) (x) [14] x x Pseudonymity [24] x Anonymity [38] x [18] (x) x x [47] x [48] x [26] x x [42] x Pseudonymity [27] x x [45] x x [15] (x) x x [19] x x x Pseudonymity [32] x [23] x x x [17] x Pseudonymity [43] x x [36] x [33] x [37] x [40] x x x [41] x x x the survey is representative of the different directions in this field. Additionally, since papers are from the last 5 years, this section gives an up-to-date vision on the research trends in WSN privacy. ...
... Journal of Sensors 5 Source [30] x (query) [22] x (sensor data) [28] Source [25] x (source) [52] Sink [29] x (events) [31] x (query) x (aggregator) [21] Source [34] x [20] Source [49] x [53] x [16] x (events) [46] Source [50] Source [35] x (source) [54] x [13] x [14] Both [24] Source [38] Source [18] Source [47] Both [48] [26] ...
... x x [29] x [31] x [21] x x [34] x x [20] x [49] x [53] x [16] x x [46] x [50] x [35] x x [54] x [13] x x [14] x x [24] x x [38] x [18] x x [47] x [48] x [26] x [42] x x [27] x [45] x [15] x x [19] [32] ...
Article
Full-text available
Wireless Sensor Networks (WSNs) are attracting attention from the research community. One of the key issues is to provide them with privacy protection. In recent years, a huge amount of contributions has been focused on this area. Surveys and literature reviews have also been produced to give a systematic view of the different approaches taken. However, no previous work has focused on privacy models, that is, the set of assumptions made to build the approach. In particular, this paper focuses on this matter by studying 41 papers of the last 5 years. We highlight the great differences appearing among related papers that could make them incompatible to be applied simultaneously. We propose a set of guidelines to build comprehensive privacy models so as to foster their comparability and suitability analysis for different scenarios.
... Sensor-enabled products and their networks are becoming commonplace, and central to everyday life, e.g., healthcare, smart homes, object tracking and monitoring, and so on. Moreover, according to the latest finding " wireless sensor networks 2012-2021 " [2] -WSN businesses will grow rapidly to over two billion US dollars for the future systems in 2022. WSNs consist of a large number of inexpensive sensors that have quite limited resources (e.g., low processing units, low bandwidth, limited battery power, and low memory) [3]. ...
Article
Full-text available
For preventing malicious nodes joining wireless sensor networks (WSNs), an access control mechanism is necessary for the trustworthy cooperation between the nodes. In addition to access control, recently, privacy has been an important topic regarding how to achieve privacy without disclosing the real identity of communicating entities in the WSNs. Based on elliptic curve cryptography (ECC), in this paper we present a access control protocol with node privacy (called ACP) for the WSN. The proposed scheme not only accomplishes the node authentication but also provides the identity privacy (i.e., source to destination and vice-versa) for the communicating entities. Compared with the current state of the art, the proposed solution can defend actively against attacks. The efficacy and efficiency of the proposed ACP are confirmed through the test-bed analysis and performance evaluations.
... Hierarchical sensor network security positioning [7], lightweight security localization method [8]. ...
Article
Full-text available
The guest editor thanks all the authors who have contributed their time and effort submitting their outstanding works in response to the call for papers, regardless of whether their works have been published in this special issue or not on account of the space limitations. The guest editors are also grateful to all the reviewers for their valuable suggestions to the authors on improving the issues and presentation of their papers.