Learn More
In many applications, wireless sensor networks need to secure information. Actual researchs found efficient solutions for this kind of network, principally by using cryptography to secure the data transfer. However an encrypted information send by the network can be sufficient to preventan attacker, who eavesdrops the network, that somethingimportant has(More)
Wireless sensor networks (WSNs) consist of a large number of tiny sensor nodes. Hence, a cluster-based architecture can be used to deal the self-organization issues of large networks. This cluster-based organization can prolong network lifetime and reduce broadcast overhead. In this paper, we propose an Efficient Self-Organization Algorithm for Clustering(More)
Wireless sensor networks are threatened by numerous attacks. Therefore, security is now becoming an important new path of research and attempts to counter these attacks. However, even if research finds solutions to counter known attacks, we show in this article that there is a threat in wireless sensor networks by using the 802.15.4 protocol. It is possible(More)
This paper describes a proposal to provide a solution to grid applications specific needs in data transport security. The solution combines different security protocols to secure data transport, integrity and confidentiality. To address the key management part, the solution secures the local DNS server with the DNSSEC extensions, making it become a local(More)
A Wireless Sensor Network (WSN) consists of a large number of sensor nodes designed to collect information about an environment and transmit the accumulated data using a wireless technology to a base station known as Sink. In this way, the wireless technology is an important factor in the design of a sensor network. Several wireless technologies are(More)
Wireless sensor networks are specific adhoc networks. They are characterized by their limited computing power and energy constraints. This paper proposes a study of security in this kind of network. We show what are the specificities and vulnerabilities of wireless sensor networks. We present a list of attacks, which can be found in these particular(More)
except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar(More)
Cooperation is an efficiency factor in many activities like design, medicine or maintenance. Several researches try to optimize cooperation activity by using tools or algorithms designed to enhance human interaction. Few researches are made on conceptual cooperation modeling. However, industrials want to compare different algorithms, organizations or(More)