dc.creator | Varela, Noel | |
dc.creator | Pineda Lezama, Omar Bonerge | |
dc.creator | Neira, Harold | |
dc.date | 2021-02-19T16:56:35Z | |
dc.date | 2021-02-19T16:56:35Z | |
dc.date | 2020-12-04 | |
dc.date.accessioned | 2023-10-03T20:09:48Z | |
dc.date.available | 2023-10-03T20:09:48Z | |
dc.identifier | https://hdl.handle.net/11323/7887 | |
dc.identifier | https://doi.org/10.3233/JIFS-189167 | |
dc.identifier | Corporación Universidad de la Costa | |
dc.identifier | REDICUC - Repositorio CUC | |
dc.identifier | https://repositorio.cuc.edu.co/ | |
dc.identifier.uri | https://repositorioslatinoamericanos.uchile.cl/handle/2250/9174652 | |
dc.description | The principle assaults on a Wireless Sensor Network (WSN) essentially influence the uprightness and accessibility of the data gathered, for example, Deni-al of Service, Blackhole, Wormhole, and assault on the data being transmitted. Privacy is not an important security objective because the data caught by the sensors are typically not delicate or mystery from individuals. A remote sensor organizes applied to shrewd metering frameworks might be adequately powerful as far as robotization and adjustment of the information that is gathered, however, if the system doesn’t have satisfactory security, both the client and the organization offering the support might be influenced by assaults on the respectability and accessibility of the data transmitted. This research proposes the use of MESH encryption techniques and Star topology to find the best combination that meets the requirements of a Smart Metering System. | |
dc.format | application/pdf | |
dc.format | application/pdf | |
dc.language | eng | |
dc.publisher | Corporación Universidad de la Costa | |
dc.relation | https://content.iospress.com/journals/journal-of-intelligent-and-fuzzy-systems/39/6 | |
dc.relation | M. Saikia and M.A. Hussain, Efficient data encryption
technique using quaternions for wireless sensor network,
Cryptologia (2020), 1–21. | |
dc.relation | A.A. Agarkar, M. Karyakarte and H. Agrawal, Post Quantum Security Solution for Data Aggregation in Wireless
Sensor Networks. In 2020 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–8). IEEE.
(2020) | |
dc.relation | L. Chhaya, P. Sharma, G. Bhagwatikar and A. Kumar,
Wireless sensor network based smart grid communications:
Cyber attacks, intrusion detection system and topology control, Electronics 6(1) (2017), 5. | |
dc.relation | Y. Zhu and D. Zhou, Security Technology of Wireless
Sensor Network Based on IPSEC, In The International Conference on Cyber Security Intelligence and Analytics (pp.
92–97). Springer, Cham. (2020). | |
dc.relation | C. Vasquez, R. Ramírez-Pisco, A. Viloria, D. Martínez Sierra, E. Ruiz-Barrios, P.H. Hernández . . . and J. De la Hoz Hernandez, Conglomerates of Bus Rapid Transit in Latin American Countries, In Advances in Intelligent Systems and Computing (Vol. 1039, pp. 220–228). Springer. (2020). https://doi.org/10.1007/978-3-030-30465-2 25 | |
dc.relation | A.G. Finogeev and A.A. Finogeev, Information attacks and
security in wireless ensor networks of industrial SCADA
systems, Journal of Industrial Information Integration 5
(2017), 6–16. | |
dc.relation | A.E. Guerrero-Sanchez, E.A. Rivas-Araiza, J.L. Gonzalez Cordoba, M. Toledano-Ayala and A. Takacs, Blockchain
Mechanism and Symmetric Encryption in A Wireless Sensor Network, Sensors 20(10) (2020), 2798. | |
dc.relation | Y. Kabalci, A survey on smart metering and smart grid communication, Renewable and Sustainable Energy Reviews 57
(2016), 302–318. | |
dc.relation | K. Haseeb, A. Almogren, I. Ud Din, N. Islam and A.
Altameem, SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things,
Sensors 20(9) (2020), 2468 | |
dc.relation | K. Thangaramya, K. Kulothungan, S. Indira Gandhi, M.
Selvi, S.V.N. Santhosh Kumar and K. Arputharaj, Intelligent
fuzzy rule-based approach with outlier detection for secured
routing in WSN, Soft Computing (2020), 1–15 | |
dc.relation | P. Kumar, Y. Lin, G. Bai, A. Paverd, J.S. Dong and A. Martin,
Smart grid metering networks: A survey on security, privacy
and open research issues, IEEE Communications Surveys &
Tutorials 21(3) (2019), 2886–2927. | |
dc.relation | C.E. Kement, B. Tavli, H. Gultekin and H. Yanikomeroglu,
Holistic Privacy for Electricity, Water, and Natural Gas
Metering in Next Generation Smart Homes, arXiv preprint
arXiv:2004.13363. (2020). | |
dc.relation | Y. Long and F. Xiong, Secret Sharing Based BLMQ
Signature Generation, In Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy
(pp. 6–12). (2020) | |
dc.relation | D.A. Chekired, L. Khoukhi and H.T. Mouftah, Fog-Based Distributed Intrusion Detection System Against False
Metering Attacks in Smart Grid. In ICC 2019–2019 IEEE
International Conference on Communications (ICC) (pp.
1–6). IEEE. (2019) | |
dc.relation | M. Shrestha, C. Johansen, J. Noll and D. Roverso, A
Methodology for Security Classification applied to Smart
Grid Infrastructures, International Journal of Critical
Infrastructure Protection 28 (2020), 100342. | |
dc.relation | I. Batra, S. Verma and M. Alazab, A lightweight IoT-based
security framework for inventory automation using wireless
sensor network, International Journal of Communication
Systems 33(4) (2020), e4228. | |
dc.relation | S. Ali, A. Humaria, M.S. Ramzan, I. Khan, S.M. Saqlain,
A. Ghani,... and B.A. Alzahrani, An efficient cryptographic
technique using modified Diffie–Hellman in wireless sensor networks, International Journal of Distributed Sensor
Networks 16(6) (2020), 1550147720925772. | |
dc.relation | K. Shah and D.C. Jinwala, Performance analysis of symmetric key ciphers in linear and grid based sensor networks,
arXiv preprint arXiv:1809.06587. (2018). | |
dc.relation | H. Ma, Z. Zhang, H. Li, S.L. Yin and Z. Chu, A provable private data aggregation scheme based on digital signatures and
homomorphic encryption for wireless sensor networks, J Inf
Hiding Multimedia Signal Process 8(3) (2017), 536–543. | |
dc.relation | K. Shankar and M. Elhoseny, An Optimal Haar Wavelet
with Light Weight Cryptography Based Secret Data Hiding
on Digital Images in Wireless Sensor Networks. In Secure
Image Transmission in Wireless Sensor Network (WSN)
Applications (pp. 65–81). Springer, Cham. (2019). | |
dc.relation | K. Shankar and M. Elhoseny, An Optimal Haar Wavelet
with Light Weight Cryptography Based Secret Data Hiding
on Digital Images in Wireless Sensor Networks. In Secure
Image Transmission in Wireless Sensor Network (WSN)
Applications (pp. 65–81). Springer, Cham. (2019). | |
dc.relation | K. Shankar and M. Elhoseny, An Optimal Haar Wavelet
with Light Weight Cryptography Based Secret Data Hiding
on Digital Images in Wireless Sensor Networks. In Secure
Image Transmission in Wireless Sensor Network (WSN)
Applications (pp. 65–81). Springer, Cham. (2019). | |
dc.relation | Q.A. Al-Haija, H. Enshasy and A. Smadi, Estimating energy
consumption of diffie hellman encrypted key exchange
(DH-EKE) for wireless sensor network, In 2017 IEEE International Conference on Intelligent Techniques in Control,
Optimization and Signal Processing (INCOS) (pp. 1–6).
IEEE. (2017). | |
dc.relation | Y. Maleh, A. Ezzati and M. Belaissaoui, (Eds.). Security and Privacy in Smart Sensor Networks. IGI Global. (2018) | |
dc.relation | A.A. Agarkar, M. Karyakarte and H. Agrawal, Post Quantum Security Solution for Data Aggregation in Wireless
Sensor Networks. In 2020 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1–8). IEEE.
(2020). | |
dc.relation | J. Zhang, L. Lv, M. Zhu and Q. Zhang, Research on
Intelligent Substation Wireless Sensor Network System
Architecture Based on Internet of Things Technology.
In 2020 Prognostics and Health Management Conference
(PHM-Besanc¸on) (pp. 324–327). IEEE. (2020) | |
dc.relation | V.A. Memos, K.E. Psannis, Y. Ishibashi, B.G. Kim and B.B.
Gupta, An efficient algorithm for media-based surveillance
system (EAMSuS) in IoT smart city framework, Future
Generation Computer Systems 83 (2018), 619–628. | |
dc.relation | G. Tuna, D.G. Kogias, V.C. Gungor, C. Gezer, E. Tas¸kın
and E. Ayday, A survey on information security threats and
solutions for Machine to Machine (M2M) communications,
Journal of Parallel and Distributed Computing 109 (2017),
142–154. | |
dc.relation | A. Ara, Privacy Preservation in Cloud Based Cyber Physical Systems, Journal of Computational and Theoretical
Nanoscience 16(10) (2019), 4320–4327. | |
dc.relation | A. Viloria, A. Senior Naveda, H. Hernandez Palma,
W. Niebles Núez and L. Niebles Núez, Electrical ˜
Consumption Patterns through Machine Learning, In Journal of Physics: Conference Series
(Vol. 1432). Institute of Physics Publishing (2020).
https://doi.org/10.1088/1742–6596/1432/1/012093. | |
dc.relation | A. Viloria, D.M. Sierra, L. de la Hoz, M.O. Bohorquez, O.R. Bilbao, A.R. Pichon, . . . and H. Hernández-Palma, NoSQL Database for Storing Historic Records in Monitoring Systems: Selection Process, In Advances in Intelligent Systems and Computing (Vol. 1039, pp. 336–344). Springer. https://doi.org/10.1007/978-3-030-30465-2 38. (2020). | |
dc.relation | S.W. Pritchard, G.P. Hancke and A.M. Abu-Mahfouz, Security in software-defined wireless sensor networks: Threats, challenges and potential solutions. In 2017 IEEE 15th International Conference on Industrial Informatics (INDIN) (pp. 168–173). IEEE. (2017). | |
dc.relation | Y. Zhu and D. Zhou, Security Technology of Wireless
Sensor Network Based on IPSEC. In The International Conference on Cyber Security Intelligence and Analytics (pp. 92–97). Springer, Cham. (2020). | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights | http://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.rights | info:eu-repo/semantics/openAccess | |
dc.rights | http://purl.org/coar/access_right/c_abf2 | |
dc.source | Journal of Intelligent & Fuzzy Systems | |
dc.source | https://content.iospress.com/articles/journal-of-intelligent-and-fuzzy-systems/ifs189167 | |
dc.subject | Security | |
dc.subject | encryption | |
dc.subject | topology | |
dc.subject | WSN | |
dc.subject | smart metering networks | |
dc.subject | cryptographic techniques | |
dc.title | Information security in WSN applied to smart metering networks based on cryptographic techniques | |
dc.type | Artículo de revista | |
dc.type | http://purl.org/coar/resource_type/c_6501 | |
dc.type | Text | |
dc.type | info:eu-repo/semantics/article | |
dc.type | info:eu-repo/semantics/publishedVersion | |
dc.type | http://purl.org/redcol/resource_type/ART | |
dc.type | info:eu-repo/semantics/acceptedVersion | |
dc.type | http://purl.org/coar/version/c_ab4af688f83e57aa | |