Learn More
Vehicu lar ad-hoc networks (VANETs) technology has emerged as an important research area over the last few years. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communication(More)
Wireless Body Area Networks (WBAN) have emerged as an extension to conventional wireless sensor networks in recent years to comply with the needs in providing timely and effective response in healthcare as one of the many target applications such networks have. The traffic of a WBAN is diverse due to different monitoring tasks carried on by sensor nodes. It(More)
Wireless sensor networks are a promising future of many commercial and military applications. However, these networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional(More)
Secure key management is crucial to meet the security goals to prevent the Wireless Sensor Networks (WSNs) being compromised by an adversary. Owing to ad-hoc nature and resource limitations of sensor networks, provisioning a right key management is challenging. In this paper we present a Novel Secure Key Management (NSKM) module providing an efficient(More)
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security(More)
Key management is critical to meet the security goals to prevent the sensor networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sensor networks, providing a right key management is challenging. Traditional key management schemes based on trusted third parties like a certification authority are impractical due to(More)
Wireless Sensor Networks (WSN) have become promising future for many applications. The development of WSN was originally motivated by military applications; however, these networks have drawn attention from many civilian applications ranging from environment and habitat monitoring, home automation, traffic control to health care applications. One of the(More)
Data aggregation in wireless sensor networks (WSN) is a rapidly emerging research area. It can greatly help conserve the scarce energy resources by eliminating redundant data thus achieving a longer network lifetime. However , securing data aggregation in WSN is made even more challenging, by the fact that the sensor nodes and aggregators deployed in(More)
The existing digital watermarking schemes use a digital pattern like pseudorandom number sequence, a logo image or a digital signature as the watermark. Use of such watermarks is not convincing as the ownership of such a watermark is not clear for ownership claims. This paper proposes an efficient digital watermark generation technique from biometric iris(More)