715 research outputs found

    Improvement of assurance including security for wireless sensor networks using dispersed data transmission

    Get PDF
    AbstractAssurance networks are one of the essential technologies of New-generation Networks. Assurance is defined as the capability of guaranteeing functional and non-functional system properties such as dependability, security, timeliness and adaptability to heterogeneous and changing requirements. Assurance is essential for sustainable networks and this research focused specifically on providing assurance for WSNs. Node capture attacks are one prospective kind of attack on WSNs. To reduce negative effect of node capture attacks, we have previously proposed secure decentralized data transfer. In this proposed method, it was assumed that multiple paths were in place. In this paper as well, we again propose using the multipath routing method. To make multiple paths fit our previously proposed method, we have modified ATR (Augmented Tree Based Routing). We have conducted simulation experiments using our proposed method in a network simulator. The results show that our previously proposed method is effective in both cases in which the network size is small or large. In addition, we conducted other simulation experiments to measure several aspects of the assurance of our method. We measured in terms of varying parameters such as node densities, distance between the source and the destination nodes, and so on. Additionally, our method is more assured than the single path-based method

    Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services

    Get PDF
    Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication and computation at a low premium of cost and power. In this article, we explore the fundamental concepts guiding the design and implementation of WSNs. We report the latest developments in WSN software and services for meeting existing requirements and newer demands; particularly in the areas of: operating system, simulator and emulator, programming abstraction, virtualization, IP-based communication and security, time and location, and network monitoring and management. We also reflect on the ongoing efforts in providing dependable assurances for WSN-driven CPS. Finally, we report on its applicability with a case-study on smart buildings

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    INSENS: Intrusion-tolerant routing for wireless sensor networks

    Get PDF
    This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless sensor networks (WSNs). The key objective of an INSENS network is to tolerate damage caused by an intruder who has compromised deployed sensor nodes and is intent on injecting, modifying, or blocking packets. To limit or localize the damage caused by such an intruder, INSENS incorporates distributed lightweight security mechanisms, including efficient one-way hash chains and nested keyed message authentication codes that defend against wormhole attacks, as well as multipath routing. Adapting to WSN characteristics, the design of INSENS also pushes complexity away from resource-poor sensor nodes towards resource-rich base stations. An enhanced single-phase version of INSENS scales to large networks, integrates bidirectional verification to defend against rushing attacks, accommodates multipath routing to multiple base stations, enables secure joining/leaving, and incorporates a novel pairwise key setup scheme based on transitory global keys that is more resilient than LEAP. Simulation results are presented to demonstrate and assess the tolerance of INSENS to various attacks launched by an adversary. A prototype implementation of INSENS over a network of MICA2 motes is presented to evaluate the cost incurred

    SALR: Secure adaptive load-balancing routing in service oriented wireless sensor networks

    Get PDF
    Congestion control and secure data transfer are the major factors that enhance the efficiency of Service Oriented Wireless Sensor Networks. It is desirable to modify the routing and security schemes adaptively in order to respond effectively to the rapidly changing Network State. Adding more complexities to the routing and security schemes increases the end-to-end delay which is not acceptable in Service Oriented WSNs which are mostly in real time. We propose an algorithm Secure Adaptive Load-Balancing Routing (SALR) protocol, in which the routing decision is taken at every hop considering the unforeseen changes in the network. Multipath selection based on Node Strength is done at every hop to decide the most secure and least congested route. The system predicts the best route rather than running the congestion detection and security schemes repeatedly. Simulation results show that security and latency performance is better than reported protocols

    Trust Score based Optimized Cluster Routing (TSOCR) approach for Enhancing the Lifetime of Wireless Sensor Networks

    Get PDF
    Energy efficiency is the most significant obstacle that Wireless Sensor Networks (WSN) must overcome, and the desire for solutions that maximize energy efficiency will never go away. There are a variety of methods that can be utilized to improve energy efficiency, with data transmission as the primary driver of maximum energy consumption. The transmission of data from the source to destination nodes uses more energy. When the transmission of data is handled better, the energy efficiency is improved and the lifetime of the network is increased. The purpose of this research is to propose an Trust Score based Optimized Cluster Routing (TSOCR)  scheme for WSNs, which is based on Whale Optimization Algorithm (WOA). A total trust score is derived by combining the results of computing three distinct trust scores, such as the direct, indirect, and the most recent trust score. The path that has the highest trust score is chosen as the route and employed for data transmission. The effectiveness of the work is evaluated by looking at factors such as the rate of packet delivery, the latency, the amount of energy consumed and the lifetime of the network

    Enhanced EQSR based QoS Mechanism for Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are widely used in real-time applications. Due to the resource limited nature of sensor networks providing Quality of Service (QoS) is quiet interesting and challenging task for the researchers in recent years. The QoS based schemes require to cope up with the energy constrained smaller devices. Therefore, allowing QoS applications in sensor networks mandate it to implement in separate layers. In this work an enhanced version of Energy Efficient Quality of Service Routing (EQSR) is offered. The enhanced EQSR maximizes the task of the application in mixed delay sensitive and delay tolerant applications. The scheme balances the energy by distributing the traffic in a disperse manner that guaranties the delay sensitive packets to be forwarded on time within the tolerable delay. By conducting simulations with varying scenarios the performance of the protocol is evaluated and compared with the base EQSR. The simulation results have proven that the enhanced EQSR works better by lowering the energy and increasing the packet delivery ratio
    corecore