Next Issue
Previous Issue

E-Mail Alert

Add your e-mail address to receive forthcoming issues of this journal:

Journal Browser

Journal Browser

Table of Contents

J. Sens. Actuator Netw., Volume 3, Issue 3 (September 2014), Pages 181-244

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Readerexternal link to open them.
View options order results:
result details:
Displaying articles 1-3
Export citation of selected articles as:

Research

Jump to: Review

Open AccessArticle An Authenticated Key Agreement Scheme for Wireless Sensor Networks
J. Sens. Actuator Netw. 2014, 3(3), 181-206; doi:10.3390/jsan3030181
Received: 6 May 2014 / Revised: 17 June 2014 / Accepted: 17 June 2014 / Published: 1 July 2014
Cited by 3 | PDF Full-text (464 KB) | HTML Full-text | XML Full-text
Abstract
We propose a new authenticated key agreement scheme based on Blom’s scheme, but using multiple master keys and public keys in permutations to compute the private keys in each node. The computations are over a small prime field, and by storing them [...] Read more.
We propose a new authenticated key agreement scheme based on Blom’s scheme, but using multiple master keys and public keys in permutations to compute the private keys in each node. The computations are over a small prime field, and by storing them in a random order in the node, the private-public-master-key associations (PPMka) of the private keys are lost. If a node is captured, the PPMka of the private keys cannot be determined with certainty, making it difficult to begin to attack the scheme. We obtained analytical results to show that, using suitable keying parameters, the probability of discovering the correct PPMka can be made so small, that a very powerful adversary needs to capture the entire network of tens of thousands of nodes or expend an infeasible amount of effort to try all of the possible solutions. We verified our results using computer-simulated attacks on the scheme. The unknown PPMka enables our scheme to break free from the capture threshold of the original Blom’s scheme, so that it can be used in large networks of low-resource devices, such as sensor nodes. Full article
Open AccessArticle Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks
J. Sens. Actuator Netw. 2014, 3(3), 224-244; doi:10.3390/jsan3030224
Received: 12 June 2014 / Revised: 25 August 2014 / Accepted: 26 August 2014 / Published: 3 September 2014
Cited by 2 | PDF Full-text (220 KB) | HTML Full-text | XML Full-text
Abstract
Designing secure authentication mechanisms in wireless sensor networks in order to associate a node to a secure network is not an easy task due to the limitations of this type of networks. In this paper, we propose different multi-hop node authentication protocols [...] Read more.
Designing secure authentication mechanisms in wireless sensor networks in order to associate a node to a secure network is not an easy task due to the limitations of this type of networks. In this paper, we propose different multi-hop node authentication protocols for wireless sensor networks. For each protocol, we provide a formal proof to verify the security of our proposals using Scyther, which is an automatic cryptographic protocols verification tool. We also provide implementation results in terms of execution time consumption obtained by real measurements on TelosB motes. These protocols offer different security mechanisms depending on the design of the protocol itself. Moreover, we evaluate the overhead of protection of each solution by studying the effect on execution time overhead of each protocol. Finally, we propose a mechanism to detect possible attack based on our evaluation results. Full article
Figures

Review

Jump to: Research

Open AccessReview On the Modeling of Solar-Powered Wireless Sensor Nodes
J. Sens. Actuator Netw. 2014, 3(3), 207-223; doi:10.3390/jsan3030207
Received: 4 June 2014 / Revised: 26 June 2014 / Accepted: 14 July 2014 / Published: 4 August 2014
Cited by 1 | PDF Full-text (7185 KB) | HTML Full-text | XML Full-text
Abstract
Solar energy harvesting allows for wireless sensor networks to be operated over extended periods of time. In order to select an appropriate harvesting architecture and dimension for its components, an effective method for the comparison of system implementations is required. System simulations [...] Read more.
Solar energy harvesting allows for wireless sensor networks to be operated over extended periods of time. In order to select an appropriate harvesting architecture and dimension for its components, an effective method for the comparison of system implementations is required. System simulations have the capability to accomplish this in an accurate and efficient manner. In this paper, we evaluate the existing work on solar energy harvesting architectures and common methods for their modeling. An analysis of the existing approaches demonstrates a mismatch between the requirement of the task to be both accurate and efficient and the proposed modeling methods, which are either accurate or efficient. As a result, we propose a data-driven modeling method based on artificial neural networks for further evaluation by the research community. Preliminary results of an initial investigation demonstrate the capability of this method to accurately capture the behavior of a solar energy harvesting architecture, while providing a time-efficient model generation procedure based on system-level data. Full article
(This article belongs to the Special Issue Environmental Wireless Sensor Networks)
Figures

Journal Contact

MDPI AG
JSAN Editorial Office
St. Alban-Anlage 66, 4052 Basel, Switzerland
jsan@mdpi.com
Tel. +41 61 683 77 34
Fax: +41 61 302 89 18
Editorial Board
Contact Details Submit to JSAN
Back to Top