Search results

1 – 10 of over 16000
Article
Publication date: 31 December 2006

R. Kalindi, R. Kannan, S.S. Iyengar and A. Durresi

Security in sensor networks is more important than traditional networks as they are deployed in hostile environments and are more prone to capture. Trusted third party…

Abstract

Security in sensor networks is more important than traditional networks as they are deployed in hostile environments and are more prone to capture. Trusted third party authentication schemes, public‐key systems are not suitable owing to their high resource requirements. Key pre‐distribution was introduced in (3) to solve this problem. Our scheme achieves identical connectivity compared to the random key pre distribution (4) using a less number of preloaded keys in each sensor node. The design of our scheme is motivated by the observation that at present most key pre‐distribution schemes employ random mechanisms which use a large number of keys and are unsuitable for sensor networks. In this paper we extend the deterministic key pre‐distribution scheme proposed by us in our earlier work (1), which is based on assigning keys to sensors by placing them on a grid. This approach has been further modified to use multiple mappings of keys to nodes. In each mapping every node gets distinct set of keys which it shares with different nodes. The key assignment is done such that, there will be keys in common between nodes in different sub‐grids. After randomly being deployed, the nodes discover common keys, authenticate and communicate securely. The analysis and simulation results show that this scheme is able to achieve better security compared to the random schemes.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 3 April 2009

Sajid Hussain, Firdous Kausar, Ashraf Masood and Jong Hyuk Park

As large‐scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the heterogeneous sensor networks (HSN) are preferred because…

Abstract

Purpose

As large‐scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the heterogeneous sensor networks (HSN) are preferred because they provide better performance and security solutions for scalable applications in dynamic environments. Random key pre‐distribution schemes are vulnerable to collusion attacks. The purpose of this paper is to propose an efficient collusion resistant security mechanism for heterogeneous sensor networks.

Design/methodology/approach

The authors consider a heterogeneous sensor network (HSN) consists of a small number of powerful high‐end H‐sensors and a large number of ordinary low‐end L‐sensors. However, homogeneous sensor network (MSN) consists of only L‐sensors. Since the collusion attack on key pre‐distribution scheme mainly takes advantage of the globally applicable keys, which are selected from the same key pool, they update the key ring after initial deployment and generate new key rings by using one‐way hash function on nodes' IDs and initial key rings. Further, in the proposed scheme, every node is authenticated by the BS in order to join the network.

Findings

The analysis of the proposed scheme shows that even if a large number of nodes are compromised, an adversary can only exploit a small number of keys near the compromised nodes, while other keys in the network remain safe.

Originality/value

The proposed key management scheme described in the paper outperforms the previous random key pre‐distribution schemes by: considerably reducing the storage requirement, and providing more resiliency against node capture and collusion attacks.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 20 November 2009

Daniel Kraft, Marc Bechler, Hans‐Joachim Hof, Frank Pählke and Lars Wolf

Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes…

Abstract

Purpose

Secure communication is very important for computer networks. Thereby, authentication is one of the most eminent preconditions. In ad hoc networks, common authentication schemes are not applicable since public key infrastructures with a centralized certification authority are hard to deploy in ad hoc networking environments. This paper aims to investigate these issues.

Design/methodology/approach

In order to overcome these issues, the paper proposes and evaluates a security concept based on a distributed certification facility. Thereby, a network is divided into clusters with one special head node each. These cluster head nodes perform administrative functions and hold shares of a network key used for certification. New nodes start to participate in the network as guests; they can only become full members with a network‐signed certificate after their authenticity has been warranted by some other members. Access to resources and services within the ad hoc network is controlled using authorization certificates.

Findings

The feasibility of this concept was verified by simulations. Three different models for node mobility were used in order to include realistic scenarios as well as to make the results comparable to other work. The simulation results include an evaluation of the log‐on times, availability, and communication overhead.

Originality/value

The paper introduces a cluster‐based architecture to realize a distributed public key infrastructure that is highly adapted to the characteristics of ad hoc networks.

Details

International Journal of Pervasive Computing and Communications, vol. 5 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 23 July 2019

Mohammed Saïd Salah, Maizate Abderrahim, Ouzzif Mohamed and Toumi Mohamed

This paper aims to provide an acceptable level of security while taking into account limited capabilities of the sensors. This paper proposes a mobile approach to securing data…

Abstract

Purpose

This paper aims to provide an acceptable level of security while taking into account limited capabilities of the sensors. This paper proposes a mobile approach to securing data exchanged by structured nodes in a cluster.

Design/methodology/approach

The approach is based on mobile nodes with significant calculation and energy resources that allow cryptographic key management and periodic rekeying. However, mobility in wireless sensor networks aims to increase the security and lifetime of the entire network. The technical methods used in this paper are based on cryptography elliptic curves and key management through a balanced binary tree.

Findings

To maintain the effectiveness of critical applications based on wireless sensor networks, a good level of nodes security must be ensured, taking into account their limited energy and computing. Collaboration between powerful mobile nodes provides better coverage and a good key management. Owing to the significant capabilities of the mobile nodes, they can be used to secure critical applications at the same time if needed in applications requiring difficult operations.

Originality/value

To compare the performance of the proposed approach with other mobile algorithms, the following metrics are focused on: the energy consumed by normal sensors and cluster heads, the number of packets exchanged during key installation, time to generate and distribute cryptographic keys and the memory used by the different sensors to store keys.

Details

International Journal of Pervasive Computing and Communications, vol. 15 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 17 November 2021

Zhoupeng Han, Chenkai Tian, Zihan Zhou and Qilong Yuan

Complex mechanical 3D computer-aided design (CAD) model embodies rich implicit design knowledge. Through discovering the key function parts and key function module in 3D CAD…

Abstract

Purpose

Complex mechanical 3D computer-aided design (CAD) model embodies rich implicit design knowledge. Through discovering the key function parts and key function module in 3D CAD assembly model in advance, it can promote the designers’ understanding and reuse efficiency of 3D assembly model in design reuse.

Design/methodology/approach

An approach for discovering key function module in complex mechanical 3D CAD assembly model is proposed. First, assembly network for 3D CAD assembly model is constructed, where the topology structure characteristics of 3D assembly model are analyzed based on complex network centrality. The degree centrality, closeness centrality, betweenness centrality and mutual information of node are used to evaluate the importance of the parts in 3D assembly model. Then, a multi-attribute decision model for part-node importance is established, and the comprehensive evaluation for key function parts in 3D assembly model is accomplished by combining Analytic Hierarchy Process and Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS). Subsequently, a community discovery of function module in assembly model-based Clauset–Newman–Moore (CNM)-Centrality is given in details. Finally, 3D CAD assembly model of worm gear reducer is taken as an example to verify the effectiveness and feasibility of proposed method.

Findings

The key function part in CAD assembly model is evaluated comprehensively considering assembly topology more objectively. In addition, the key function module containing key function part is discovered from CAD assembly model by using CNM-Centrality-based community discovery.

Practical implications

The approach can be used for discovering important design knowledge from complex CAD assembly model when reusing the assembly model. It can help designers capture and understand the design thinking and intent, improve the reuse efficiency and quality.

Originality/value

The paper first proposes an approach for discovering key function module in complex mechanical 3D CAD assembly model taking advantage of complex network theory, where the key function part is evaluated using node centrality and TOPSIS, and the key function module is identified based on community discovery.

Details

Assembly Automation, vol. 42 no. 1
Type: Research Article
ISSN: 0144-5154

Keywords

Article
Publication date: 27 May 2014

Sachin Dilip Babar, Neeli Rashmi Prasad and Ramjee Prasad

The paper aims to address wireless sensor network (WSN) security by proposing new cluster-based mobile key management scheme (CMKMS). The growing demands of WSNs in variety of…

Abstract

Purpose

The paper aims to address wireless sensor network (WSN) security by proposing new cluster-based mobile key management scheme (CMKMS). The growing demands of WSNs in variety of real-time and mission-critical applications increase the challenges in terms of energy efficiency, security and mobility. The security is important to avoid malicious attacks and improve the energy efficiency, while mobility helps to improve the reachability of network. The CMKMS algorithm focuses on the management and maintenance of keys under cluster-based mobile WSN network.

Design/methodology/approach

The paper studied the related work in the area of key management and compared the different key management algorithms according to the technique used. The comparative study shows that the available key management algorithms are efficient in terms of security, but they are not scaleable enough to the changing conditions of network and do not work efficiently under node mobility. The research uses cluster-based approach for improving scalability, where cluster head (CH) acts as a key manager. The work developed by considering both static and mobile CH.

Findings

The CMKMS considers two phases, first for key maintenance which establishes the two private keys, home key for own cluster and foreign key when node moves from one cluster to another. The second phase maintains the keys when CH moves from one cluster to another. The proposed algorithm improves the efficiency of key management algorithm in terms of security, mobility, energy efficiency and scalability of network. The simulation of scheme in different realistic situation shows that proposed solution shows less computational overheads, energy consumption and delay as compared with state-of-art solution.

Research limitations/implications

The research is validated using computer-based simulation, which limits the testing of research by considering external environmental conditions. Therefore, research can be further test using WSN test bed.

Practical implications

The research address the issues in key management, developed the scaleable, and node mobility supportable key management algorithms, for addressing the demands of growing WSN applications.

Originality/value

This paper accomplish the security of WSN using scaleable and mobility-supported key management algorithms.

Details

International Journal of Pervasive Computing and Communications, vol. 10 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 February 2024

Lan Xu and Xueyi Zhu

Currently, China’s manufacturing industry chain still faces the danger of chain breakage due to the persistent “lack of technology” issue. The definition and detection of key nodes

Abstract

Purpose

Currently, China’s manufacturing industry chain still faces the danger of chain breakage due to the persistent “lack of technology” issue. The definition and detection of key nodes in the industry chain are significant to the enhancement of the stability of the industry chain. Therefore, detecting the key nodes in the manufacturing industry chain is necessary.

Design/methodology/approach

A complex network based on the links amongst listed manufacturing enterprises is built, and the authors analyse the network’s basic characteristics and vulnerability, taking into account the impact of scientific and technological innovation on the stability of the industry chain.

Findings

It is found that the high structural characteristic of midstream nodes in the naval architecture and marine engineering equipment industry chain determines their importance to stability, and the key status of upstream nodes is reflected in the weakness of technological innovation. The upstream nodes should focus on improving their independent innovation and R&D capability, whilst the midstream nodes should maintain a close supply–demand cooperation relationship.

Originality/value

The key node detection model for industry chain stability is constructed by considering various factors from the perspective of network and technological innovation. Empirical study is conducted to verify effectiveness of proposed method.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 28 April 2022

Yuting Zhang, Lan Xu and Zhengnan Lu

The purpose of this paper is to show that research on policy diffusion mechanism of Government Procurement of Public Services (GPPS) is beneficial to improve the efficiency of…

Abstract

Purpose

The purpose of this paper is to show that research on policy diffusion mechanism of Government Procurement of Public Services (GPPS) is beneficial to improve the efficiency of policy formulation and implementation.

Design/methodology/approach

In view of the four dimensions which are internal demand, external pressure, policy innovation environment and service characteristic, a system of factors affecting policy diffusion is established. On this basis, a Multilayer Fuzzy Cognitive Map (MFCM) model for policy diffusion of GPPS is constructed. Nonlinear Hebbian Learning algorithm and genetic algorithm are applied to optimize the two components of the MFCM model, which are relationship between nodes at the same layer and influence weights between nodes at different layers, respectively. Taking Nanjing municipal government purchasing elderly-care services in China as the empirical object, simulation of policy diffusion based on the MFCM model is carried out, aiming to obtain the key factors influencing policy diffusion and the dynamic diffusion mechanism of GPPS policy.

Findings

Research results show that, compared with monolayer Fuzzy Cognitive Map, the MFCM model converges faster. In addition, simulation results of policy diffusion indicate that economic development level of jurisdiction, superior pressure, administrative level and operability of services are key influencing factors which are under four dimensions correspondingly. And the dynamic influencing mechanism of key factors has also been learned.

Originality/value

This paper constructs the MFCM model, which is a new approach based on several monolayer FCMs, to study the policy diffusion mechanism.

Details

Kybernetes, vol. 52 no. 10
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 13 September 2022

Ali Noroozian, Babak Amiri and Mehrdad Agha Mohammad Ali Kermani

Movies critics believe that the diversity of Iranian cinematic genres has decreased over time. The paper aims to answer the following questions: What is the impact of the…

Abstract

Purpose

Movies critics believe that the diversity of Iranian cinematic genres has decreased over time. The paper aims to answer the following questions: What is the impact of the continuous cooperation between the key nodes on the audience's taste, uniformity of the cinematic genres and the box office? Is there any relationship between the importance of actors in the actors' network and their popularity?

Design/methodology/approach

In the artistic world, artists' relationships lead to a network that affects individuals' commercial or artistic success and defines the artwork's value. To study the issue that the diversity of Iranian cinematic genres has decreased over time, the authors utilized social network analysis (SNA), in which every actor is considered a node, and its collaboration with others in the same movies is depicted via edges. After preparing the desired dataset, networks were generated, and metrics were calculated. First, the authors compared the structure of the network with the box office. The results illustrated that the network density growth negatively affects box office. Second, network key nodes were identified, their relationships with other actors were inspected using the Apriori algorithm to examine the density cause and the cinematic genre of key nodes, and their followers were investigated. Finally, the relationship between the actors' Instagram follower count and their importance in the network structure was analyzed to answer whether the generated network is acceptable in society.

Findings

The social problem genre has stabilized due to continuous cooperation between the core nodes because network density negatively impacts the box office. As well as, the generated network in the cinema is acceptable by the audience because there is a positive correlation between the importance of actors in the network and their popularity.

Originality/value

The novelty of this paper is investigating the issue raised in the cinema industry and trying to inspect its aspects by utilizing the SNA to deepen the cinematic research and fill the gaps. This study demonstrates a positive correlation between the actors' Instagram follower count and their importance in the network structure, indicating that people follow those central in the actors' network. As well as investigating the network key nodes with a heuristic algorithm using coreness centrality and analyzing their relationships with others through the Apriori algorithm. The authors situated the analysis using a novel and original dataset from the Iranian actors who participated in the Fajr Film Festival from 1998 to 2020.

Article
Publication date: 10 March 2021

Manjunath Beemappa Edigar and P.V. Rao

In the past recent years, wireless sensor network (WSN) has progressively grown as an emerging technology. Various research efforts have been made in the literature to address the…

74

Abstract

Purpose

In the past recent years, wireless sensor network (WSN) has progressively grown as an emerging technology. Various research efforts have been made in the literature to address the problem associated with WSN security. Based on the review analysis, it is found that the existing methods are mostly associated with complex security operations that are not suitable for resource constraint sensor nodes. The proposed paper has presented cost-effective modeling of the security framework that addresses the problem of security and energy in WSN.

Design/methodology/approach

The proposed security framework implements two different protocols to attain maximum security services and optimizes the security operation of the proposed security models to achieve higher energy efficiency and privacy preservation against a majority of the lethal attacks. The first security model introduces a novel cost-efficient pairwise key-based authentication mechanism to identify the availability of optimal routes under the presence of adversary in the network. The second security model introduces an integrated part of the first security model that optimizes security operation to perform secure communication using a lightweight encryption mechanism.

Findings

Based on the experimental outcome and analysis, the proposed system attains a 60% performance improvement in terms of security and computational efficiency compared to the existing Sec-LEACH. The second security model has achieved a 50% improvement in terms of overall aspects like reduction in transmission delay, packet delivery ratio, remaining energy and communication performance.

Originality/value

The proposed study has presented a computationally efficient model that provides lightweight security operations based on secure hash function. It also focuses on the security associations between WSN nodes and the selection of reliable routes for secure data transmission. The design of the proposed security model is best suited for homogeneous and heterogeneous sensor networks, which will be robust to any attacking scenario.

Details

International Journal of Intelligent Unmanned Systems, vol. 10 no. 1
Type: Research Article
ISSN: 2049-6427

Keywords

1 – 10 of over 16000