Essays about: "authentication in wsn"
Found 4 essays containing the words authentication in wsn.
-
1. Detecting Impersonation Attacks in a Static WSN
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The current state of security found in the IoT domain is highly flawed, a major problem being that the cryptographic keys used for authentication can be easily extracted and thus enable a myriad of impersonation attacks. In this MSc thesis a study is done of an authentication mechanism called device fingerprinting. READ MORE
-
2. A Self-organized Wireless Sensor Network (WSN) for a Home-event Managed System : Design of a cost efficient 6LoWPAN-USB Gateway with RFID security
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Wireless Sensor Networks (WSN) have existed for many years in industry applications for different purposes but their use has not been fully extended to the global consumers. Sensor networks have lately resulted to be greatly helpful to people in everyday life, specially in home automation applications for monitoring events, security, and control of devices and different elements in the house by using actuators. READ MORE
-
3. Efficient Key Generation and Distributionon Wireless Sensor Networks
University essay from KTH/KommunikationsnätAbstract : Wireless Sensor Networks have become popular during the last years. The introduction ofIPv6 which broadened the address space available, IEEE802.15.4 and adaption layers such as6loWPAN have allowed the intercommunication of small devices. READ MORE
-
4. Authentication of Queries in Wireless Sensor Networks
University essay from Institutionen för informationsteknologiAbstract : AQF protocol is a novel approach to authenticate queries in wireless sensor networks to avoid that anybody can inject fake queries in to WSN and likewise to avoid modification of legitimate queries by adversary. Because in any sensor network, sensor nodes are distributed in a width geographical area, an adversary can get a physical access to some sensor nodes and use them to inject some fake queries or to change some of forwarded quires into the network. READ MORE