16,596 research outputs found
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Survey on Data-Centric based Routing Protocols for Wireless Sensor Networks
The great concern for energy that grew with the technological advances in the
field of networks and especially in sensor network has triggered various
approaches and protocols that relate to sensor networks. In this context, the
routing protocols were of great interest. The aim of the present paper is to
discuss routing protocols for sensor networks. This paper will focus mainly on
the discussion of the data-centric approach (COUGAR, rumor, SPIN, flooding and
Gossiping), while shedding light on the other approaches occasionally. The
functions of the nodes will be discussed as well. The methodology selected for
this paper is based on a close description and discussion of the protocol. As a
conclusion, open research questions and limitations are proposed to the reader
at the end of this paper
Protector Control PC-AODV-BH in The Ad Hoc Networks
In this paper we deal with the protector control that which we used to secure
AODV routing protocol in Ad Hoc networks. The considered system can be
vulnerable to several attacks because of mobility and absence of
infrastructure. While the disturbance is assumed to be of the black hole type,
we purpose a control named "PC-AODV-BH" in order to neutralize the effects of
malicious nodes. Such a protocol is obtained by coupling hash functions,
digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on
three performance metrics and taking into account the number of black hole
malicious nodesComment: submit 15 pages, 19 figures, 1 table, Journal Indexing team, AIRCC
201
Mobile Computing in Digital Ecosystems: Design Issues and Challenges
In this paper we argue that the set of wireless, mobile devices (e.g.,
portable telephones, tablet PCs, GPS navigators, media players) commonly used
by human users enables the construction of what we term a digital ecosystem,
i.e., an ecosystem constructed out of so-called digital organisms (see below),
that can foster the development of novel distributed services. In this context,
a human user equipped with his/her own mobile devices, can be though of as a
digital organism (DO), a subsystem characterized by a set of peculiar features
and resources it can offer to the rest of the ecosystem for use from its peer
DOs. The internal organization of the DO must address issues of management of
its own resources, including power consumption. Inside the DO and among DOs,
peer-to-peer interaction mechanisms can be conveniently deployed to favor
resource sharing and data dissemination. Throughout this paper, we show that
most of the solutions and technologies needed to construct a digital ecosystem
are already available. What is still missing is a framework (i.e., mechanisms,
protocols, services) that can support effectively the integration and
cooperation of these technologies. In addition, in the following we show that
that framework can be implemented as a middleware subsystem that enables novel
and ubiquitous forms of computation and communication. Finally, in order to
illustrate the effectiveness of our approach, we introduce some experimental
results we have obtained from preliminary implementations of (parts of) that
subsystem.Comment: Proceedings of the 7th International wireless Communications and
Mobile Computing conference (IWCMC-2011), Emergency Management: Communication
and Computing Platforms Worksho
- …