1,107 research outputs found

    Wireless industrial monitoring and control networks: the journey so far and the road ahead

    Get PDF
    While traditional wired communication technologies have played a crucial role in industrial monitoring and control networks over the past few decades, they are increasingly proving to be inadequate to meet the highly dynamic and stringent demands of today’s industrial applications, primarily due to the very rigid nature of wired infrastructures. Wireless technology, however, through its increased pervasiveness, has the potential to revolutionize the industry, not only by mitigating the problems faced by wired solutions, but also by introducing a completely new class of applications. While present day wireless technologies made some preliminary inroads in the monitoring domain, they still have severe limitations especially when real-time, reliable distributed control operations are concerned. This article provides the reader with an overview of existing wireless technologies commonly used in the monitoring and control industry. It highlights the pros and cons of each technology and assesses the degree to which each technology is able to meet the stringent demands of industrial monitoring and control networks. Additionally, it summarizes mechanisms proposed by academia, especially serving critical applications by addressing the real-time and reliability requirements of industrial process automation. The article also describes certain key research problems from the physical layer communication for sensor networks and the wireless networking perspective that have yet to be addressed to allow the successful use of wireless technologies in industrial monitoring and control networks

    Distributed reactive routing for selective forwarding attack resilience in wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) are an emerging technology that may one day supply real-time information to many services and Internet-based applications. The utility of WSNs relies on the ability to provide valid information, even in the presence of failures or attackers. Current research in the field has identified a large variety of attacks and countermeasures, however, few works address how WSN routing protocols can autonomously react to detected attacks. The works that do provide attack-reactive schemes generally require nodes to coordinate or exchange trust/detection reports. This work aims to maximize data delivery in the presence of selective forwarding attacks with nodes performing detection and reaction operations independently. Via modifications to the Collection Tree Protocol\u27s forwarding path and route update procedure, nodes autonomously evaluate their parent\u27s forwarding reliability and duplicate data to alternative parent nodes when deemed necessary. As shown though a number of simulations, this distributed scheme yields significant data recovery with only modest overheads for attackers dropping data at medium to high rates

    Security in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) pose a new challenge to network designers in the area of developing better and secure routing protocols. Many sensor networks have mission-critical tasks, so it is clear that security needs to be taken into account at design time. However, sensor networks are not traditional computing devices, and as a result, existing security models and methods are ill suited. The security issues posed by sensor networks represent a rich field of research problems. Improving network hardware and software may address many of the issues, but others will require new supporting technologies. With the recent surge in the use of sensor networks, for example, in ubiquitous computing and body sensor networks (BSNs) the need for security mechanisms has a more important role. Recently proposed solutions address but a small subset of current sensor network attacks. Also because of the special battery requirements for such networks, normal cryptographic network solutions are irrelevant. New mechanisms need to be developed to address this type of network

    Comprehensive Survey Congestion Control Mechanisms in Wireless Sensor Networks:Comprehensive Survey

    Get PDF
    Wireless sensor network (WSN) occupies the top rank of the widely used networks for gathering different type of information from different averments. WSN has nodes with limited resources so congestion can cause a critical damage to such network where it limited resources can be exhausted. Many approaches has been proposed to deal with this problem. In this paper, different proposed algorithm for congestion detection, notification, mitigation and avoidance has been listed and discussed. These algorithms has been investigated by presenting its advantages and disadvantages. This paper provides a robust background for readers and researches for wireless sensor networks congestion control approaches. Keywords: WSN, Congestion Control, congestion mitigation, congestion detection, sink channel load, buffer load

    A Learning based Secure Routing Approach using Deep Reinforcement Learning in IoT Integrated Wireless Sensor Network

    Get PDF
    The usage of Wireless Sensor Network (WSN) is ubiquitous in nature. With the emergence of Internet of Things (IoT) technology and its unprecedented use cases, the role of sensor networks as part of IoT application became crucial. WSN became backbone of IoT to realize integration between physical and digital worlds and connectivity to Internet. However, IoT devices are resource constrained with limited computational capabilities. The entire network is distributed in nature and has increased complexity. Routing in such WSN integrated IoT network plays an important role in achieving meaningful communication among objects. In this context, it is indispensable to have more energy efficient routing method. Since the IoT integrated sensor network is highly complicated, it is very dynamic in nature. Thus routing decisions are also dynamic leading to much importance to routing in such use cases. With the emergence of Artificial Intelligence (AI), it became possible to solve complex real world problems through learning based approach which acquires desired intelligence prior to making decisions. In this paper we proposed a deep reinforcement learning based routing mechanism for energy efficient routing in WSN-IoT integrated application. We proposed novel algorithms for network setup, formation of clusters and routing. Our method adapts to network changes due to energy levels, mobility and makes learning based routing decisions. We enhanced the method further with security to ensure its Qualityof Service (QoS) in presence of attacks. Our simulation study using MATLAB has revealed that the proposed secure routing approach outperforms existing protocols

    Cooperative Self-Scheduling Secure Routing Protocol for Efficient Communication in MANET

    Get PDF
    In wireless transmission, a Mobile Ad-hoc Network (MANET) contains many mobile nodes that can communicate without needing base stations. Due to the highly dynamic nature of wireless, MANETs face several issues, like malicious nodes making packet loss, high energy consumption, and security. Key challenges include efficient clustering and routing with optimal energy efficiency for Quality of Service (QoS) performance. To combat these issues, this novel presents Cooperative Self-Scheduling Secure Routing Protocol (CoS3RP) for efficient scheduling for proficient packet transmission in MANET. Initially, we used Elite Sparrow Search Algorithm (ESSA) for identifies the Cluster Head (CH) and form clusters. The Multipath Optimal Distance Selection (MODS) technique is used to find the multiple routes for data transmission. Afterward, the proposed CoS3RP transmits the packets based on each node authentication. The proposed method for evaluating and selecting efficient routing and data transfer paths is implemented using the Network simulator (NS2) tool, and the results are compared with other methods. Furthermore, the proposed well performs in routing performance, security, latency and throughput
    • …
    corecore