Loading...
Search for: sensor-networks
0.02 seconds
Total 325 records

    Abnormality detection and monitoring in multi-sensor molecular communication

    , Article IEEE Transactions on Molecular, Biological, and Multi-Scale Communications ; Volume 5, Issue 2 , 2019 , Pages 68-83 ; 23327804 (ISSN) Ghoroghchian, N ; Mirmohseni, M ; Nasiri Kenari, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we investigate the problem of detecting and monitoring changes (abnormality) in molecular communication (MC), using the quickest change detection (QCD) schemes. The objective is to watch an environment using a sensor network and make decisions on the time and location of changes based on the received signals from sensors in the fusion center (FC). Such assumptions call for considering spatial and temporal correlations among sensors' transmitting signals. We use the framework of Partially Observable Markov Decision Processes (POMDPs) based on non-homogeneous Markov models. The metric in detection (stopping-time) scenario is to minimize the delay of announcing an abnormality... 

    A biometric security scheme for wireless body area networks

    , Article Journal of Information Security and Applications ; Volume 41 , 2018 , Pages 62-74 ; 22142134 (ISSN) Dodangeh, P ; Jahangir, A. H ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    Wireless body area networks (WBANs) are receiving significant interest as the next generation of wireless networks and emerging technology in the field of health monitoring. One of the most important factors for the acceptance of WBANs is the provision of appropriate security and access control mechanisms. Due to its nature in transferring the patients' sensitive data, WBAN has both classical and specific security requirements. In this paper, we survey such requirements and propose a new security scheme for satisfying them in WBANs. The proposed scheme deals with the overall network architecture, including intra- and inter-WBAN tiers, and proposes two mutual authentication and key exchange... 

    A bayesian game approach for preventing DoS attacks in wireless sensor networks

    , Article Proceedings - 2009 WRI International Conference on Communications and Mobile Computing, CMC 2009, 6 January 2009 through 8 January 2009, Kunming, Yunnan ; Volume 3 , 2009 , Pages 507-511 ; 9780769535012 (ISBN) Mohi, M ; Movaghar, A ; Zadeh, P. M ; Sharif University of Technology
    2009
    Abstract
    Wireless sensor networks (WSNs) are a new technology, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act... 

    3D visibility and partial visibility complex

    , Article 2007 International Conference on Computational Science and its Applications, ICCSA 2007, Kuala Lumpur, 26 August 2007 through 29 August 2007 ; September , 2007 , Pages 208-215 ; 0769529453 (ISBN); 9780769529455 (ISBN) Nouribygi, M ; Ghodsi, M ; Sharif University of Technology
    2007
    Abstract
    Visibility is an important topic in computer graphics, motion planning, and computational geometry. To deal with the increasing complexity of the scenes considered, some research has been performed in visibility processing in order to accelerate the visibility determination. Two of the most studied such structures are visibility graph and visibility complex. Visibility graph is a fundamental geometric structure which is used in many applications, including illumination and rendering, motion planning, pattern recognition, and sensor networks. While the concept of visibility graph is widely studied for 2D scenes, there is no acceptable equivalence of visibility graph for 3D space. Similarly,... 

    2D Hash Chain robust Random Key Distribution scheme

    , Article Information Processing Letters ; Volume 116, Issue 5 , 2016 , Pages 367-372 ; 00200190 (ISSN) Ehdaie, M ; Alexiou, N ; Ahmadian, M ; Aref, M. R ; Papadimitratos, P ; Sharif University of Technology
    Elsevier  2016
    Abstract
    Many Random Key Distribution (RKD) schemes have been proposed in the literature to enable security applications in Wireless Sensor Networks (WSNs). A main security aspect of RKD schemes is their resistance against node capture attacks, since compromising the sensors and capturing their keys is a common risk in such networks. We propose a new method, based on a 2-Dimensional Hash Chain (2DHC), that can be applied on any RKD scheme to improve their resilience. Our method maintains the flexibility and low cost features of RKD schemes and it doesn't require any special-purpose hardware or extra memory to store keys in the sensors. We demonstrate that our approach significantly increases the...