3 research outputs found

    A distance vector hop-based secure and robust localization algorithm for wireless sensor networks

    Get PDF
    Location information of sensor nodes in a wireless sensor network is important. The sensor nodes are usually required to ascertain their positions so that the data collected by these nodes can be labeled with this information. On the other hand, certain attacks on wireless sensor networks lead to the incorrect estimation of sensor node positions. In such situations, when the location information is not correct, the data may be labeled with wrong location information that may subvert the desired operation of the wireless sensor network. In this work, we formulate and propose a distance vector hop-based algorithm to provide secure and robust localization in the presence of malicious sensor nodes that result in incorrect position estimation and jeopardize the wireless sensor network operation. The algorithm uses cryptography to ensure secure and robust operation in the presence of adversaries in the sensor network. As a result of the countermeasures, the attacks are neutralized and the sensor nodes are able to estimate their positions as desired. Our secure localization algorithm provides a defense against various types of security attacks, such as selective forwarding, wormhole, Sybil, tampering, and traffic replay, compared with other algorithms which provide security against only one or two types. Simulation experiments are performed to evaluate the performance of the proposed method, and the results indicate that our secure localization algorithm achieves the design objectives successfully. Performance of the proposed method is also compared with the performance of basic distance vector hop algorithm and two secure algorithms based on distance vector hop localization. The results reveal that our proposed secure localization algorithm outperforms the compared algorithms in the presence of multiple attacks by malicious nodes

    Energy efficient in cluster head and relay node selection for wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) are defined as networks of nodes that work in a cooperative way to sense and control the surrounding environment. However, nodes contain limited energy which is the key limiting factor of the sensor network operation. In WSN architecture, the nodes are typically grouped into clusters where one node from each cluster is selected as the Cluster Head (CH) and relays utilisation to minimise energy consumption. Currently, the selection of CH based on a different combination of input variables. Example of these variables includes residual energy, communication cost, node density, mobility, cluster size and many others. Improper selection of sensor node (i.e. weak signal strength) as CH can cause an increase in energy consumption. Additionally, a direct transmission in dual-hop communication between sensor nodes (e.g. CH) with the base station (BS) uses high energy consumption. A proper selection of the relay node can assist in communication while minimising energy consumption. Therefore, the research aim is to prolong the network lifetime (i.e. reduce energy consumption) by improving the selection of CHs and relay nodes through a new combination of input variables and distance threshold approach. In CH selection, the Received Signal Strength Indicator (RSSI) scheme, residual energy, and centrality variable were proposed. Fuzzy logic was utilized in selecting the appropriate CHs based on these variables in the MATLAB. In relay node selection, the selection is based on the distance threshold according to the nearest distance with the BS. The selection of the optimal number of relay nodes is performed using K-Optimal and K-Means techniques. This ensures that all CHs are connected to at least one corresponding relay node (i.e. a 2-tier network) to execute the routing process and send the data to BS. To evaluate the proposal, the performance of Multi-Tier Protocol (MAP) and Stable Election Protocol (SEP) was compared based on 100, 200, and 800 nodes with 1 J and random energy. The simulation results showed that our proposed approach, refer to as Energy Efficient Cluster Heads and Relay Nodes (EECR) selection approach, extended the network lifetime of the wireless sensor network by 43% and 33% longer than SEP and MAP, respectively. This thesis concluded that with effective combinations of variables for CHs and relay nodes selection in static environment for data routing, EECR can effectively improve the energy efficiency of WSNs

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks
    corecore