289 research outputs found

    Location based services in wireless ad hoc networks

    Get PDF
    In this dissertation, we investigate location based services in wireless ad hoc networks from four different aspects - i) location privacy in wireless sensor networks (privacy), ii) end-to-end secure communication in randomly deployed wireless sensor networks (security), iii) quality versus latency trade-off in content retrieval under ad hoc node mobility (performance) and iv) location clustering based Sybil attack detection in vehicular ad hoc networks (trust). The first contribution of this dissertation is in addressing location privacy in wireless sensor networks. We propose a non-cooperative sensor localization algorithm showing how an external entity can stealthily invade into the location privacy of sensors in a network. We then design a location privacy preserving tracking algorithm for defending against such adversarial localization attacks. Next we investigate secure end-to-end communication in randomly deployed wireless sensor networks. Here, due to lack of control on sensors\u27 locations post deployment, pre-fixing pairwise keys between sensors is not feasible especially under larger scale random deployments. Towards this premise, we propose differentiated key pre-distribution for secure end-to-end secure communication, and show how it improves existing routing algorithms. Our next contribution is in addressing quality versus latency trade-off in content retrieval under ad hoc node mobility. We propose a two-tiered architecture for efficient content retrieval in such environment. Finally we investigate Sybil attack detection in vehicular ad hoc networks. A Sybil attacker can create and use multiple counterfeit identities risking trust of a vehicular ad hoc network, and then easily escape the location of the attack avoiding detection. We propose a location based clustering of nodes leveraging vehicle platoon dispersion for detection of Sybil attacks in vehicular ad hoc networks --Abstract, page iii

    Coverage Protocols for Wireless Sensor Networks: Review and Future Directions

    Full text link
    The coverage problem in wireless sensor networks (WSNs) can be generally defined as a measure of how effectively a network field is monitored by its sensor nodes. This problem has attracted a lot of interest over the years and as a result, many coverage protocols were proposed. In this survey, we first propose a taxonomy for classifying coverage protocols in WSNs. Then, we classify the coverage protocols into three categories (i.e. coverage aware deployment protocols, sleep scheduling protocols for flat networks, and cluster-based sleep scheduling protocols) based on the network stage where the coverage is optimized. For each category, relevant protocols are thoroughly reviewed and classified based on the adopted coverage techniques. Finally, we discuss open issues (and recommend future directions to resolve them) associated with the design of realistic coverage protocols. Issues such as realistic sensing models, realistic energy consumption models, realistic connectivity models and sensor localization are covered

    Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey

    Full text link
    Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The devices cooperate to monitor one or more physical phenomena within an area of interest. WSNs operate as stochastic systems because of randomness in the monitored environments. For long service time and low maintenance cost, WSNs require adaptive and robust methods to address data exchange, topology formulation, resource and power optimization, sensing coverage and object detection, and security challenges. In these problems, sensor nodes are to make optimized decisions from a set of accessible strategies to achieve design goals. This survey reviews numerous applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs. Furthermore, various solution methods are discussed and compared to serve as a guide for using MDPs in WSNs

    Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies

    Get PDF
    [[abstract]]Over the last few years, we have witnessed a growing interest in Cyber Physical Systems (CPSs) that rely on a strong synergy between computational and physical components. CPSs are expected to have a tremendous impact on many critical sectors (such as energy, manufacturing, healthcare, transportation, aerospace, etc) of the economy. CPSs have the ability to transform the way human-to-human, human-toobject, and object-to-object interactions take place in the physical and virtual worlds. The increasing pervasiveness of Wireless Sensor Networking (WSN) technologies in many applications make them an important component of emerging CPS designs. We present some of the most important design requirements of CPS architectures. We discuss key sensor network characteristics that can be leveraged in CPS designs. In addition, we also review a few well-known CPS application domains that depend on WSNs in their design architectures and implementations. Finally, we present some of the challenges that still need to be addressed to enable seamless integration of WSN with CPS designs.[[incitationindex]]SCI[[booktype]]ç´™

    Robot Localization Obtained by Using Inertial Measurements, Computer Vision, and Wireless Ranging

    Get PDF
    Robots have long been used for completing tasks that are too difficult, dangerous, or distant to be accomplished by humans. In many cases, these robots are highly specialized platforms - often expensive and capable of completing every task related to a mission\u27s objective. An alternative approach is to use multiple platforms, each less capable in terms of number of tasks and thus significantly less complex and less costly. With advancements in embedded computing and wireless communications, multiple such platforms have been shown to work together to accomplish mission objectives. In the extreme, collections of very simple robots have demonstrated emergent behavior akin to that seen in nature (e.g., bee colonies) motivating the moniker of \u27\u27swarm robotics\u27\u27 - a group of robots working collaboratively to accomplish a task. The use of robotic swarms offers the potential to solve complex tasks more efficiently than a single robot by introducing robustness and flexibility to the system. This work investigates localization in heterogeneous and autonomous robotic swarms to improve their ability to carry out exploratory missions in unknown terrain. Collaboratively, these robots can, for example, conduct sensing and mapping of an environment while simultaneously evolving a communication network. For this application, among many others, it is required to determine an accurate knowledge of the robot\u27s pose (i.e., position and orientation). The act of determining the pose of the robot is known as localization. Some low cost robots can provide location estimates using inertial measurements (i.e., odometry), however this method alone is insufficient due to cumulative errors in sensing. Image tracking and wireless localization methods are implemented in this work to increase the accuracy of localization estimates. These localization methods complement each other: image tracking yields higher accuracy than wireless, however a line-of-sight (LOS) with the target is required; wireless localization can operate under LOS or non-LOS conditions, however has issues in multipath conditions. Together, these methods can be used to improve localization results under all sight conditions. The specific contributions of this work are: (1) a concept of \u27shared sensing\u27 in which extremely simple and inexpensive robots with unreliable localization estimates are used in a heterogeneous swarm of robots in a way that increases the accuracy of localization for the simple agents and simultaneously extends the sensing capabilities of the more complex robots, (2) a description, evaluation, and discussion of various means to estimate a robot\u27s pose, (3) a method for increasing reliability of RSSI measurements for wireless ranging/localization systems by averaging RSSI measurements over both time and space, (4) a process for developing an in-field model to be used for estimating the location of a robot by leveraging the existing wireless communication system

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    AN ENERGY EFFICIENT CROSS-LAYER NETWORK OPERATION MODEL FOR MOBILE WIRELESS SENSOR NETWORKS

    Get PDF
    Wireless sensor networks (WSNs) are modern technologies used to sense/control the environment whether indoors or outdoors. Sensor nodes are miniatures that can sense a specific event according to the end user(s) needs. The types of applications where such technology can be utilised and implemented are vast and range from households’ low end simple need applications to high end military based applications. WSNs are resource limited. Sensor nodes are expected to work on a limited source of power (e.g., batteries). The connectivity quality and reliability of the nodes is dependent on the quality of the hardware which the nodes are made of. Sensor nodes are envisioned to be either stationary or mobile. Mobility increases the issues of the quality of the operation of the network because it effects directly on the quality of the connections between the nodes

    Localization of nodes in wired and wireless networks

    Get PDF
    This thesis focuses on the implementation of algorithms for localization of nodes in wired and wireless networks. The thesis is organized into two papers. The first paper presents the localization algorithms based on time of arrival (TOA) and time difference of arrival (TDOA) techniques for computer networks such as the Internet by using round-trip-time (RTT) measurements obtained from known positions of the gateway nodes. The RTT values provide an approximate measure of distance between the gateway nodes and an unknown node. The least squares technique is then used to obtain an estimated position of the unknown node. The second paper presents localization of an unknown node during route setup messages in wireless ad hoc and sensor networks using a new routing protocol. A proactive multi-interface multichannel routing (MMCR) protocol, recently developed at Missouri S&T, was implemented on the Missouri S&T motes. This protocol calculates link costs based on a composite metric defined using the available end-to-end delay, energy utilization, and bandwidth, and it chooses the path that minimizes the link cost factor to effectively route the information to the required destination. Experimental results indicate enhanced performance in terms of quality of service, and implementation of this protocol requires no modification to the current IEEE 802.11 MAC protocol. Received signal strength indicator (RSSI) values are recorded from the relay nodes (gateway nodes) to the unknown node during route setup messages. The location of the unknown node is estimated using these values with some a priori profiling and the known positions of the relay nodes as inputs to the least squares technique --Abstract, page iv

    Routing, Localization And Positioning Protocols For Wireless Sensor And Actor Networks

    Get PDF
    Wireless sensor and actor networks (WSANs) are distributed systems of sensor nodes and actors that are interconnected over the wireless medium. Sensor nodes collect information about the physical world and transmit the data to actors by using one-hop or multi-hop communications. Actors collect information from the sensor nodes, process the information, take decisions and react to the events. This dissertation presents contributions to the methods of routing, localization and positioning in WSANs for practical applications. We first propose a routing protocol with service differentiation for WSANs with stationary nodes. In this setting, we also adapt a sports ranking algorithm to dynamically prioritize the events in the environment depending on the collected data. We extend this routing protocol for an application, in which sensor nodes float in a river to gather observations and actors are deployed at accessible points on the coastline. We develop a method with locally acting adaptive overlay network formation to organize the network with actor areas and to collect data by using locality-preserving communication. We also present a multi-hop localization approach for enriching the information collected from the river with the estimated locations of mobile sensor nodes without using positioning adapters. As an extension to this application, we model the movements of sensor nodes by a subsurface meandering current mobility model with random surface motion. Then we adapt the introduced routing and network organization methods to model a complete primate monitoring system. A novel spatial cut-off preferential attachment model and iii center of mass concept are developed according to the characteristics of the primate groups. We also present a role determination algorithm for primates, which uses the collection of spatial-temporal relationships. We apply a similar approach to human social networks to tackle the problem of automatic generation and organization of social networks by analyzing and assessing interaction data. The introduced routing and localization protocols in this dissertation are also extended with a novel three dimensional actor positioning strategy inspired by the molecular geometry. Extensive simulations are conducted in OPNET simulation tool for the performance evaluation of the proposed protocol

    Forests

    Get PDF
    In this paper, we provide an overview of positioning systems for moving resources in forest and fire management and review the related literature. Emphasis is placed on the accuracy and range of different localization and location-sharing methods, particularly in forested environments and in the absence of conventional cellular or internet connectivity. We then conduct a second review of literature and concepts related to several emerging, broad themes in data science, including the terms |, |, |, |, |, |, and |. Our objective in this second review is to inform how these broader concepts, with implications for networking and analytics, may help to advance natural resource management and science in the future. Based on methods, themes, and concepts that arose in our systematic reviews, we then augmented the paper with additional literature from wildlife and fisheries management, as well as concepts from video object detection, relative positioning, and inventory-tracking that are also used as forms of localization. Based on our reviews of positioning technologies and emerging data science themes, we present a hierarchical model for collecting and sharing data in forest and fire management, and more broadly in the field of natural resources. The model reflects tradeoffs in range and bandwidth when recording, processing, and communicating large quantities of data in time and space to support resource management, science, and public safety in remote areas. In the hierarchical approach, wearable devices and other sensors typically transmit data at short distances using Bluetooth, Bluetooth Low Energy (BLE), or ANT wireless, and smartphones and tablets serve as intermediate data collection and processing hubs for information that can be subsequently transmitted using radio networking systems or satellite communication. Data with greater spatial and temporal complexity is typically processed incrementally at lower tiers, then fused and summarized at higher levels of incident command or resource management. Lastly, we outline several priority areas for future research to advance big data analytics in natural resources.U01 OH010841/OH/NIOSH CDC HHSUnited States/U54 OH007544/OH/NIOSH CDC HHSUnited States
    • …
    corecore