International Journal of Sensors Wireless Communications and Control - Volume 5, Issue 1, 2015
Volume 5, Issue 1, 2015
-
-
Secured Communication and Authentication in Wireless Sensor Networks
More LessWireless Sensor networks are finding revolutionary applications in 24x7 unattended monitoring remotely. Such randomly deployed sensor nodes (SNs) need to send data to a central station, commonly known as base station (BS). SNs have limited energy resources and all possible attempts should be exerted to minimize energy consumption. But, maintaining secured communication poses additional challenges. This paper deals with a novel mechanism in establishing shared symmetric key between any two adjacent SNs by utilizing a 2-D matrix based key pre-distribution scheme between SNs. Versatility of this scheme is illustrated and enhanced resilency is observed in key distribution system. The use of multivariate polynomial is explored to have hierarchical authentication scheme between the BS and SNs be delegating the responsibility to cluster heads.
-
-
-
Secure MDM-OFDM-Ro-FSO System Using HG Modes
Authors: Angela Amphawan, Sushank Chaudhary and Brij B. GuptaRadio-over-free-space-optics (Ro-FSO) is a promising technique to distribute radio frequency (RF) signals over the atmosphere using optical carriers. In this work, we designed a 60Gbps-120GHz OFDM-Ro-FSO transmission system in conjunction with mode division multiplexing. Three independent 40 GHz radio signal are optically modulated at 20 Gbps and transported over a secure free-space link of 50 km by mode division multiplexing of three Hermite-Guassian modes HG 00, HG 01 and HG 02.
-
-
-
A Secure Cluster Formation Protocol for Safe Consensus in Hierarchical Mobile Ad Hoc Networks
Authors: Bharti Sharma, Ravinder S. Bhatia and Awadhesh K. SinghIn mobile ad hoc network (MANET), it is challenging to design the efficient protocols to handle various coordination problems viz. mutual exclusion, leader election, and consensus. The paper presents a secure cluster formation protocol for handling consensus in the hierarchical MANETs. We segregate the faulty nodes during cluster formation through an authentication mechanism. The proposed protocol works in a layered hierarchy because the mobile nodes are grouped into various clusters at one layer and the cluster heads collectively form the next higher layer. Subsequently, we run a consensus protocol that achieves the agreement on a common value. The protocol is robust and fault resilient. We also present the proof of correctness to ensure safe consensus in a secure cluster.
-
-
-
A Methodological Approach for Quantizing Trust from Human Behavior for Content-Driven Websites
Authors: Shruti Kohli and Himani SingalTrust is a psychological factor with subjective properties and hence is very difficult to measure or quantify. Literary assessment on Trust shows that till now researchers have mainly focused on entity-centric issues such as authentication, integrity, reputation, confidentiality, nature and use of information being exchanged but does not consider user behavior for quantizing TRUST. Trust is an inherent virtue, which can be perceived differently by different user/consumer for the same context. This artifact is an endeavor to aggregate users’ behavior over content-driven websites to deduce their prowess of Trust for the former and hence provide a scientific and practical approach for measuring and quantizing Trust. The main aim is to discern which of the users’ attitudinal factors captured by Web Analytics tools can be used to appropriately estimate Trust value for information led websites.
-
-
-
A Framework to Detect Repackaged Android Applications in Smartphone Devices
Authors: Sajal Rastogi, Kriti Bhushan and Brij B. GuptaAndroid is one of the most successful OS for smart devices and its large user base has inevitably made it the most targeted mobile OS by malwares. Android malwares have been found to have a host of different motives but most use repackaged apps as the preferred means of propagation into users' devices. This is done to exploit the popularity and trustworthiness of a legitimate app. The repackaged versions of the apps ask for more privileges at the time of installation and innocent or ignorant users install the app anyway. In this paper we propose a framework for automatic detection of repackaged apps. Our framework determines whether an app is asking for unnecessary privileges by leveraging the original manifest information of the app. The developer needs to provide the manifest information at the time of releasing the app. When a new app is installed the user is simply informed whether the app is safe or not. Our solution incurs an ignorable overhead on the Smartphone devices. It can provide highly accurate detection of repackaged version of any known app.
-
-
-
Various Techniques for Measuring Physiological Parameters Using WSN: Current State of the Art and Challenges
Authors: Jyoti Gupta and Ved R. SinghDue to development in advanced sensor technology, communication protocols, and IT infrastructure, it is easy for health care service providers to deploy an efficient and reliable wireless sensor network for providing quality services to their consumers like patients, doctors, or medical consultants. This paper describes various techniques of monitoring vital body parameters of a patient for diagnosing the root cause using WSN. The authors have further described various challenges along with some suggestions that can be used while implementing the WSN based patient monitoring system.
-
Most Read This Month
