Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 10 de 10
Filter
Add more filters










Publication year range
1.
Sensors (Basel) ; 21(14)2021 Jul 20.
Article in English | MEDLINE | ID: mdl-34300674

ABSTRACT

The evolution of the internet has led to the growth of smart application requirements on the go in the vehicular ad hoc network (VANET). VANET enables vehicles to communicate smartly among themselves wirelessly. Increasing usage of wireless technology induces many security vulnerabilities. Therefore, effective security and authentication mechanism is needed to prevent an intruder. However, authentication may breach user privacy such as location or identity. Cryptography-based approach aids in preserving the privacy of the user. However, the existing security models incur communication and key management overhead since they are designed considering a third-party server. To overcome the research issue, this work presents an efficient security model namely secure performance enriched channel allocation (S-PECA) by using commutative RSA. This work further presents the commutative property of the proposed security scheme. Experiments conducted to evaluate the performance of the proposed S-PECA over state-of-the-art models show significant improvement. The outcome shows that S-PECA minimizes collision and maximizes system throughput considering different radio propagation environments.

2.
Sensors (Basel) ; 21(11)2021 May 24.
Article in English | MEDLINE | ID: mdl-34073876

ABSTRACT

Based on the existing Internet of Vehicles communication protocol and multi-channel allocation strategy, this paper studies the key issues with vehicle communication. First, the traffic volume is relatively large which depends on the environment (city, highway, and rural). When many vehicles need to communicate, the communication is prone to collision. Secondly, because the traditional multi-channel allocation method divides the time into control time slots and transmission time slots when there are few vehicles, it will cause waste of channels, also when there are more vehicles, the channels will not be enough for more vehicles. However, to maximize the system throughput, the existing model Enhanced Non-Cooperative Cognitive division Multiple Access (ENCCMA) performs amazingly well by connected the Cognitive Radio with Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) for a multi-channel vehicular network.However, this model induces Medium Access Control (MAC) overhead and does not consider the performance evaluation in various environmental conditions.Therefore, this paper proposes a Distributed Medium Channel Allocation (DMCA) strategy, by dividing the control time slot into an appointmentand a safety period in the shared channel network. SIMITS simulator was used for experiment evaluation in terms of throughput, collision, and successful packet transmission. However, the outcome shows that our method significantly improved the channel utilizationand reduced the occurrence of communication overhead.

3.
Sensors (Basel) ; 20(4)2020 Feb 13.
Article in English | MEDLINE | ID: mdl-32069860

ABSTRACT

The growth of the Internet has led to the increasing usage of smart infotainment applications on the vehicular ad-hoc network (VANET). Preserving privacy and security regarding the provision of smart infotainment applications while on the go is most desired. Thus, a secure authentication scheme is required. Many privacy-preserving security schemes have been developed in recent times using cryptography approaches. However, these incur key management and communication overhead. The usage of third-party servers incurs the overhead of key computation, storage and distribution. Post completion of the initialization phase, the message is secured using cryptography and is shared among vehicles. The design of the proposed secure enhanced non-cooperative cognitive division multiple access ( S - ENCCMA ) aims to eliminate the need for the local message available with the parties to be released for provisioning secure safety-related applications. To overcome the research challenges, this work presents a novel security scheme, namely secure non-cooperative cognitive medium access ( S - ENCCMA ). The experiment is conducted to evaluate the overhead incurred in provisioning security to ENCCMA . The outcome shows that the overhead incurred by S - ENCCMA over ENCCMA was negligible to provide the real-time security requirements of smart infotainment applications, which is experimentally shown in this paper in terms of throughput, collision and successful packet transmission considering varied environmental models such as cities, highways and rural areas.

4.
Sensors (Basel) ; 15(7): 15127-58, 2015 Jun 26.
Article in English | MEDLINE | ID: mdl-26131669

ABSTRACT

The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

5.
Sensors (Basel) ; 14(8): 14786-805, 2014 Aug 13.
Article in English | MEDLINE | ID: mdl-25123464

ABSTRACT

Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.


Subject(s)
Computer Communication Networks/instrumentation , Computer Security/instrumentation , Internet/instrumentation , Wireless Technology/instrumentation , Algorithms , Communication , Humans
6.
Sensors (Basel) ; 14(2): 2732-55, 2014 Feb 11.
Article in English | MEDLINE | ID: mdl-24521942

ABSTRACT

Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.

7.
J Adv Prosthodont ; 4(3): 146-52, 2012 Aug.
Article in English | MEDLINE | ID: mdl-22977722

ABSTRACT

PURPOSE: The cortical bone thickness on the anterior region is important for achieving implant stability. The purpose of this study was to examine the thickness of the cortical and cancellous bones on the anterior region of the maxilla and mandible. MATERIALS AND METHODS: Twenty-five cadaver heads were used (16 male and 9 female; mean death age, 56.7 years). After the long axis of alveolar process was set up, it was measured in 5 levels starting from 2 mm below the cementoenamel junction (L1) at intervals of 3 mm. All data was analysed statistically by one-way ANOVA at the .05 significance level. RESULTS: The cortical bone thickness according to measurement levels in both the labial and lingual sides increased from L1 to L5, and the lingual side below L3 was significantly thicker than the labial side on the maxilla and mandible. In particular, the labial cortical bone thickness in the maxilla was the thinnest compared to the other regions. The cancellous bone thickness according to measurement levels increased from L1 to L5 on the maxilla, and on the mandible it was the thinnest at the middle level of the root. CONCLUSION: For implant placement on the anterior region, a careful evaluation and full knowledge on the thickness of the cortical and cancellous bone are necessary, therefore, these results may provide an anatomic guideline to clinicians.

8.
Sensors (Basel) ; 12(2): 1625-47, 2012.
Article in English | MEDLINE | ID: mdl-22438729

ABSTRACT

A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.


Subject(s)
Algorithms , Computer Communication Networks/instrumentation , Monitoring, Ambulatory/instrumentation , Signal Processing, Computer-Assisted/instrumentation , Telemedicine/instrumentation , Telemetry/instrumentation , Transducers , Computer Security , Confidentiality , Equipment Design , Equipment Failure Analysis
9.
Sensors (Basel) ; 12(1): 55-91, 2012.
Article in English | MEDLINE | ID: mdl-22368458

ABSTRACT

Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.


Subject(s)
Computer Communication Networks/instrumentation , Computer Security , Data Collection , Delivery of Health Care/methods , Electronics, Medical/instrumentation , Wireless Technology/instrumentation , Computer Communication Networks/legislation & jurisprudence , Computer Security/legislation & jurisprudence , Delivery of Health Care/legislation & jurisprudence , Electronics, Medical/legislation & jurisprudence , Wireless Technology/legislation & jurisprudence
10.
Sensors (Basel) ; 11(5): 5020-46, 2011.
Article in English | MEDLINE | ID: mdl-22163888

ABSTRACT

In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.


Subject(s)
Computer Communication Networks/instrumentation , Computer Security/instrumentation , Wireless Technology/instrumentation
SELECTION OF CITATIONS
SEARCH DETAIL
...