Entity

Time filter

Source Type

Sant'Ambrogio di Torino, Italy

Khan S.U.,University of Peshawar | Pastrone C.,Pervasive Technologies Research Area | Lavagno L.,Polytechnic University of Turin | Spirito M.A.,Pervasive Technologies Research Area
International Journal of Distributed Sensor Networks | Year: 2014

Advancement in wireless sensor network (WSN) technology makes it more attractive technology to be adopted in real world applications including home and industrial automation and e-health or infrastructure monitoring. However the mobility consideration in these applications makes the security requirements an essential and challenging task. To make the communication secure and the network robust against attacks, a proper key management scheme should be used. This paper presents a secure online key establishment and authentication scheme for mobility supported heterogeneous sensor networks. The performance evaluation of the proposed scheme is done using OMNET++ simulator while AVISPA tool is used to validate the security of the proposed scheme. It is clear from the obtained results that the proposed scheme provides better network connectivity at a low cost of memory occupation and communication overhead during the authentication and key establishment phases while improving its network resilience against attacks. © 2014 Sarmad Ullah Khan et al. Source


Khan S.U.,Polytechnic University of Turin | Pastrone C.,Pervasive Technologies Research Area | Lavagno L.,Polytechnic University of Turin | Spirito M.A.,Pervasive Technologies Research Area
6th International Conference on Risks and Security of Internet and Systems, CRiSIS 2011 | Year: 2011

Wireless Sensor Network (WSN) technology is being increasingly adopted in a wide variety of applications ranging from home/building and industrial automation to more safety critical applications including e-health or infrastructure monitoring. Considering mobility in the above application scenarios actually introduces additional technological challenges, especially with respect to security. The resource constrained devices should be robust to diverse security attacks and communicate securely while they are moving in the considered environment. To this aim, proper authentication and key management schemes supporting node mobility should be used. This paper presents an effective mutual authentication and key establishment scheme for heterogeneous sensor networks consisting of numerous mobile sensor nodes and only a few more powerful fixed sensor nodes. Moreover, OMNET++ simulations are used to provide a comprehensive performance evaluation of the proposed scheme. The obtained results show that the proposed solution assures better network connectivity, consumes less memory, has low communication overhead during the authentication and key establishment phase and has better network resilience against mobile nodes attacks compared with existing approaches for authentication and key establishment. © 2011 IEEE. Source


Khaleel H.,Pervasive Technologies Research Area | Penna F.,Polytechnic University of Turin | Pastrone C.,Pervasive Technologies Research Area | Tomasi R.,Pervasive Technologies Research Area | Spirito M.A.,Pervasive Technologies Research Area
IEEE Sensors Journal | Year: 2012

In this paper we propose an integration of dynamic channel allocation capabilities, typical of cognitive radio networks, in wireless sensor networks based on IPv6 protocol. We analyze the fundamental aspects of the proposed frequency-agile wireless sensor networks, including spectrum sensing, channel selection, network architecture, extensions of the IPv6 stack, and system operation. We then present a complete implementation of a prototype which illustrates feasibility and effectiveness of the proposed solutions. Results show that dynamic frequency allocation provides significant improvement of performance and reliability in wireless sensor networks operating in highly interfered environments. © 2011 IEEE. Source


Khan S.U.,Polytechnic University of Turin | Pastroneb C.,Pervasive Technologies Research Area | Lavagno L.,Polytechnic University of Turin | Spirito M.A.,Pervasive Technologies Research Area
Procedia Computer Science | Year: 2012

Integration between wireless sensor networks and traditional IP networks using the IPv6 and 6LoWPAN standards is a very active research and application area. A combination of hybrid network significantly increases the complexity of addressing connectivity and fault tolerance problems in a highly heterogeneous environment, including for example different packet sizes in different networks. In such challenging conditions, securing the communication between nodes with very diverse computational, memory and energy storage resources is at the same time an essential requirement and a very complex issue. In this paper we present an efficient and secure mutual authentication and key establishment protocol based on Elliptic Curve Cryptography (ECC) by which different classes of nodes, with very different capabilities, can authenticate each other and establish a secret key for secure communication. The analysis of the proposed scheme shows that it provides good network connectivity and resilience against some well known attacks. © 2012 Published by Elsevier Ltd. Source


Khaleel H.,Pervasive Technologies Research Area | Delgado M.,Pervasive Technologies Research Area | Pastrone C.,Pervasive Technologies Research Area | Spirito M.A.,Pervasive Technologies Research Area | And 2 more authors.
Proceedings of the 2013 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications, IEEE APWC 2013 | Year: 2013

Multi-access networks are envisioned to guarantee a continuous service while addressing different application requirements in terms of data rate, coverage and power consumption. Different access technologies can be effectively combined in a multi-access scenario where the overall system is able to achieve a better performance leveraging on the different characteristics of the access technologies. One of the main challenges in realizing a multi-access system is the process of properly selecting a network interface. This paper proposes a network selection algorithm based on the k-nearest neighbor data mining classification technique. This work considers Ethernet, Wi-Fi, and 3GPP technologies; however, the proposed approach could be easily adapted to take into account other access technologies. © 2013 IEEE. Source

Discover hidden collaborations