Search for dissertations about: "security in wireless sensor networks"
Showing result 1 - 5 of 21 swedish dissertations containing the words security in wireless sensor networks.
-
1. Securing Communication in IP-Connected Industrial Wireless Sensor Networks
Abstract : With the advent of wireless sensor networks (WSN) and success of wirelesscommunication in the local and personal area networks such asWi-Fi and Bluetoothmore serious efforts to apply standard wireless communication in sensitiveindustrial networks were initiated. This effort resulted in the standardizationof WirelessHART. READ MORE
-
2. Secure and Privacy-Aware Data Collection in Wireless Sensor Networks
Abstract : A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. One particular threat in wireless sensor networks is node compromise attacks, that is, attacks where the adversary gets physical access to a node and to the programs and keying material stored on it. READ MORE
-
3. Security and Self-stabilization in Sensor Network Services
Abstract : Wireless sensor networks consist of small sensor nodes that monitor their environment and that together can cover vast geographical regions. It is a promising field with many possible applications in different application areas. Typically the nodes do not have any preexisting information about the network topology when deployed. READ MORE
-
4. Enabling Scalable Security in Internet of Things
Abstract : The popular notion of Internet of Things (IoT) implies two salient features: 1. a diversity of small things, i.e., constrained devices; 2. READ MORE
-
5. Query authentication and data confidentiality in wireless sensor networks
Abstract : In this thesis we consider different aspects of security in sensor networks, in particular query authentication and confidential data aggregation. Authenticating the queries is important so attackers cannot modify existing queries because this would lead to wrong readings; or insert new queries into the network because this would lead to waste of energy. READ MORE