A cryptographic scheme for real-world wireless sensor networks applications

Author(s):  
S. Marchesani ◽  
L. Pomante ◽  
F. Santucci ◽  
M. Pugliese
2015 ◽  
Vol 27 (8) ◽  
pp. 2231-2244 ◽  
Author(s):  
Usman Raza ◽  
Alessandro Camerra ◽  
Amy L. Murphy ◽  
Themis Palpanas ◽  
Gian Pietro Picco

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Shudong Li ◽  
Yanshan Chen ◽  
Xiaobo Wu ◽  
Xiaochun Cheng ◽  
Zhihong Tian

In our paper, we study the vulnerability in cascading failures of the real-world network (power grid) under intentional attacks. Here, we use three indexes ( B , K , k -shell) to measure the importance of nodes; that is, we define three attacks, respectively. Under these attacks, we measure the process of cascade effect in network by the number of avalanche nodes, the time steps, and the speed of the cascade propagation. Also, we define the node’s bearing capacity as a tolerant parameter to study the robustness of the network under three attacks. Taking the power grid as an example, we have obtained a good regularity of the collapse of the network when the node’s affordability is low. In terms of time and speed, under the betweenness-based attacks, the network collapses faster, but for the number of avalanche nodes, under the degree-based attack, the number of the failed nodes is highest. When the nodes’ bearing capacity becomes large, the regularity of the network’s performances is not obvious. The findings can be applied to identify the vulnerable nodes in real networks such as wireless sensor networks and improve their robustness against different attacks.


2019 ◽  
Vol 8 (3) ◽  
pp. 5671-5675

The design of topology of wireless sensor networks is critical aspect in real world networks. Configuring the network topology according the attacks of the network is the solution to several node based attacks. To counter those attacks, an approach is proposed for wireless sensor networks. We propose to use networks that are free to scale and configurable according to the priority of the node. The parameters like throughput, efficiency, load balance should be exploited to make sure the connectivity of the network. The node based attacks concentrating on functional nodes in the network should be addressed and transmission of data should not be halted even after multiple attacks. The robust network should be built by applying the strategies to counter the node failures and connectivity of the network remain unaffected.


Sign in / Sign up

Export Citation Format

Share Document