scholarly journals Simple and Effective Secure Group Communications in Dynamic Wireless Sensor Networks

Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1909 ◽  
Author(s):  
Hisham N. AlMajed ◽  
Ahmad S. AlMogren

Wireless Sensor Network (WSN) is a growing area of research in terms of applications, life enhancement and security. Research interests vary from enhancing network performance and decreasing overhead computation to solving security flaws. Secure Group Communication (SGC) is gaining traction in the world of network security. Proposed solutions in this area focus on generating, sharing and distributing a group key among all group members in a timely manner to secure their communication and reduce the computation overhead. This method of security is called SGC-Shared Key. In this paper, we introduce a simple and effective way to secure the network through Hashed IDs (SGC-HIDs). In our proposed method, we distribute a shared key among the group of nodes in the network. Each node would have the ability to compute the group key each time it needs to. We provide a security analysis for our method as well as a performance evaluation. Moreover, to the best of our knowledge, we present for the first time a definition of joining or leaving attack. Furthermore, we describe several types of such an attack as well as the potential security impacts that occur when a network is being attacked.

Author(s):  
Văn Trường Nguyễn ◽  
Tuấn Anh Dương ◽  
Quý Sỹ Nguyễn

In wireless sensor networks, each sensor node nowadays is responsible for the exchange of sensory data with high performance in terms of QoS such as network throughput and delay under energy restrictions. Besides network performance, network security plays an important role in designing a wireless sensor network. One of current challenges is to design efficiently lightweight security methods to achieve highly secured transmissions and prolonged network lifetime. In this paper, we introduce an end-to-end two-way authentication scheme for WSNs under the heterogeneous assumption. By drawing on the benefit of lightweight homomorphic encryption and watermark data, numerical evaluations and security analysis show that our proposed method can prolong the network lifetime with the enhancement in network security.


2016 ◽  
Vol 14 (08) ◽  
pp. 1650041 ◽  
Author(s):  
F. L. Chen ◽  
Z. F. Han

Group signature scheme is a method of allowing a member of a group to sign a message anonymously on behalf of the group. The group administrator is in charge of adding group members and has the ability to reveal the original signer in the event of disputes. Based on controlled quantum teleportation with three-particle entangled W states, we propose a new quantum group signature scheme with designated receiver. Security analysis proves that the proposed scheme possesses the characteristics of group signature and resists the usual attacks. Compared with previous proposed schemes, this scheme follows security definition of group signature fully and meets its basic requirements.


2013 ◽  
Vol 385-386 ◽  
pp. 1591-1594
Author(s):  
Qiu Na Niu

With the popularity of group-oriented applications, secure electronic communication among all group members has become a major issue. This paper proposes a distributed group-oriented key management scheme for secure electronic communication. The scheme deploys Elliptic Curve Diffie-Hellman (ECDH) which is more lightweight as compared to regular Diffie-Hellman. According to the security analysis, the proposed scheme provides a number of desirable security properties, including group key secrecy, forward secrecy and backward secrecy.


Author(s):  
Piyush Rawat ◽  
Siddhartha Chauhan

Background and Objective: The functionalities of wireless sensor networks (WSN) are growing in various areas, so to handle the energy consumption of network in an efficient manner is a challenging task. The sensor nodes in the WSN are equipped with limited battery power, so there is a need to utilize the sensor power in an efficient way. The clustering of nodes in the network is one of the ways to handle the limited energy of nodes to enhance the lifetime of the network for its longer working without failure. Methods: The proposed approach is based on forming a cluster of various sensor nodes and then selecting a sensor as cluster head (CH). The heterogeneous sensor nodes are used in the proposed approach in which sensors are provided with different energy levels. The selection of an efficient node as CH can help in enhancing the network lifetime. The threshold function and random function are used for selecting the cluster head among various sensors for selecting the efficient node as CH. Various performance parameters such as network lifespan, packets transferred to the base station (BS) and energy consumption are used to perform the comparison between the proposed technique and previous approaches. Results and Discussion: To validate the working of the proposed technique the simulation is performed in MATLAB simulator. The proposed approach has enhanced the lifetime of the network as compared to the existing approaches. The proposed algorithm is compared with various existing techniques to measure its performance and effectiveness. The sensor nodes are randomly deployed in a 100m*100m area. Conclusion: The simulation results showed that the proposed technique has enhanced the lifespan of the network by utilizing the node’s energy in an efficient manner and reduced the consumption of energy for better network performance.


BioTech ◽  
2021 ◽  
Vol 10 (3) ◽  
pp. 13
Author(s):  
Pasquale De Blasio ◽  
Ida Biunno

Background: The emergence of “multi-omics” and “multi-parametric” types of analysis based on a high number of biospecimens enforces the use of a great number of high-quality “Biological Materials and Associated Data” (BMaD). To meet the demands of biomedical research, several Biological Resource Centers (BRCs) or Biobanks world-wide have implemented a specific Quality Management System (QMS) certified ISO 9001:2015 or accredited by CAP9 ISO 20387:2018. For the first time, ISO, with the support of several Biobanking experts, issued the ISO 20387:2018 which is the first ISO norm specific for Biobanks. The fundamental difference with present certification/accreditation standards is that the ISO 20387:2018 focuses not only on the operational aspects of the Biobank, but also on the “competence of the Biobank to carry our specific Biobanking tasks”. Methods: The accreditation process for ISO 20387:2018 required the definition of: (1) objectives, goals and organizational structure of the Biobank, including procedures for governance, confidentiality and impartiality policies; (2) standard operating procedures (SOPs) of all activities performed, including acquisition, analysis, collection, data management, distribution, preparation, preservation, testing facility and equipment maintenance, calibration, and monitoring; (3) procedures for control of documents and records, the identification of risks and opportunities, improvements, corrective actions, nonconforming records and evaluation of external providers (4) an internal audit and management reviews, verification of QMS performance, monitoring of quality objectives and personnel qualification and competency in carrying out specific Biobanking tasks. Results: The accreditation process is performed by an independent authorized organization which certifies that all processes are performed according to the QMS, and that the infrastructure is engineered and managed according to the GDP and/or GMP guidelines. Conclusion: Accreditation is given by an accreditation body, which recognizes formally that the Biobank is “competent to carry out specific Biobanking tasks”.


Sign in / Sign up

Export Citation Format

Share Document