1,507 research outputs found
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges
A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks
A Crosslayer Routing Protocol (XLRP) for Wireless Sensor Networks
The advent of wireless sensor networks with emphasis on the information being routed, rather than routing information has redefined networking from that of conventional wireless networked systems. Demanding that need for contnt based routing techniques and development of low cost network modules, built to operate in large numbers in a networked fashion with limited resources and capabilities. The unique characteristics of wireless sensor networks have the applicability and effectiveness of conventional algorithms defined for wireless ad-hoc networks, leading to the design and development of protocols specific to wireless sensor network. Many network layer protocols have been proposed for wireless sensor networks, identifying and addressing factors influencing network layer design, this thesis defines a cross layer routing protocol (XLRP) for sensor networks. The submitted work is suggestive of a network layer design with knowledge of application layer information and efficient utilization of physical layer capabilities onboard the sensor modules. Network layer decisions are made based on the quantity of information (size of the data) that needs to be routed and accordingly transmitter power leels are switched as an energy efficient routing strategy. The proposed routing protocol switches radio states based on the received signal strength (RSSI) acquiring only relevant information and piggybacks information in data packets for reduced controlled information exchange. The proposed algorithm has been implemented in Network Simulator (NS2) and the effectiveness of the protocol has been proved in comparison with diffusion paradigm
Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey
Wireless sensor networks (WSNs) consist of autonomous and resource-limited
devices. The devices cooperate to monitor one or more physical phenomena within
an area of interest. WSNs operate as stochastic systems because of randomness
in the monitored environments. For long service time and low maintenance cost,
WSNs require adaptive and robust methods to address data exchange, topology
formulation, resource and power optimization, sensing coverage and object
detection, and security challenges. In these problems, sensor nodes are to make
optimized decisions from a set of accessible strategies to achieve design
goals. This survey reviews numerous applications of the Markov decision process
(MDP) framework, a powerful decision-making tool to develop adaptive algorithms
and protocols for WSNs. Furthermore, various solution methods are discussed and
compared to serve as a guide for using MDPs in WSNs
Topology Construction in RPL Networks over Beacon-Enabled 802.15.4
In this paper, we propose a new scheme that allows coupling beacon-enabled
IEEE 802.15.4 with the RPL routing protocol while keeping full compliance with
both standards. We provide a means for RPL to pass the routing information to
Layer 2 before the 802.15.4 topology is created by encapsulating RPL DIO
messages in beacon frames. The scheme takes advantage of 802.15.4 command
frames to solicit RPL DIO messages. The effect of the command frames is to
reset the Trickle timer that governs sending DIO messages. We provide a
detailed analysis of the overhead incurred by the proposed scheme to understand
topology construction costs. We have evaluated the scheme using Contiki and the
instruction-level Cooja simulator and compared our results against the most
common scheme used for dissemination of the upper-layer information in
beacon-enabled PANs. The results show energy savings during the topology
construction phase and in the steady state
- …