1,345 research outputs found

    Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

    Get PDF
    Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource utilization and prolong the lifespan of the network. In this paper, we present an extensive literature review over the period 2002-2013 of machine learning methods that were used to address common issues in wireless sensor networks (WSNs). The advantages and disadvantages of each proposed algorithm are evaluated against the corresponding problem. We also provide a comparative guide to aid WSN designers in developing suitable machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial

    A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Get PDF
    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption

    A Pragmatic Review on Security and Integrity in Wireless Networks

    Get PDF
    Wireless transmission is one of the prominent and widely used aspects for remote and trust based networks. A wireless network encompass of a set of arbitrary as well virtually connected devices using wireless transmission media. It includes assorted but compatible set of protocols so that the communication can be done with security, integrity and higher accuracy. In wireless networks, there are two key segments as “Mobile ad hoc networks (MANET) and Wireless Sensor Networks (WSN)” using which the data transmission can be established between numbers of mobile nodes called as motes. In wireless networking, there are number of dimensions in which efficiency and quality of service is a key issue. Such aspects are energy optimization, security, cryptography, routing, scheduling, cost factor and many others. Security is one of the key domains that is considered as sensitive and most addressed domains because of many applications of wireless networks in defense, corporate sector and related sensitive domains. Till now, there are number of protocols and an algorithm using encryption and hash keys but still this area is under research. In this research manuscript, an empirical review on assorted security protocols and algorithms is presented and it is extracted that a novel multilayered algorithm can be devised, developed and proposed having the concept of dynamic hash key based generation of cryptography. Using this unique and effective approach, the overall security, integrity and performance of the wireless scenario can be improved as compared to the classical approach

    A Pragmatic Analysis on Diversified Aspects of Security and Integrity in Wireless Sensor Networks

    Get PDF
    Wireless networks are susceptible and prone to assorted attacks at different layers from multiple sources and therefore it is required to understand the mechanism as well as taxonomy of attacks. By this perspective, there is need to investigate the network level attacks, their impact and remedial measures so that the overall scenario can be made secured. The nodes in wireless environment are affected adversely by number of attacks focusing of the resources used by the nodes participating in the communication. These network nodes are generally associated with the assorted functional aspects including battery or energy, power, log of neighboring nodes, cache and number of services. In a network attack, the malicious node or packet attempts to temporarily or permanently halt these parameters so that the authentic and realistic communication can be damaged. A number of algorithmic solutions work against assorted attacks but there is huge scope of research in this segment. This manuscript underlines the attacks on wireless networks with their related dimensions so that the effectual algorithm can be developed for overall security and integrity
    corecore