194 research outputs found

    AN EFFORT TO DETERMINE CREDIBILITY AND STATUS OF SENSOR NODES

    Get PDF
    Iterative filtering algorithms hold great promise for this type of purpose. Because of limited computational power and sources, aggregation of information from multiple sensor nodes done in the aggregating node is generally accomplished by simple methods for example averaging. Within this paper we show several existing iterative filtering algorithms, while considerably better quality against collusion attacks compared to simple averaging methods, are nonetheless susceptive to some novel sophisticated collusion attack we introduce. However such aggregation is proven to be highly susceptible to node compromising attacks. Because the performance of really low power processors dramatically improves, future aggregator nodes will manage to performing modern-day data aggregation algorithms, thus making WSN less vulnerable. Thus, ascertaining standing of data and status of sensor nodes is vital for WSN. Such algorithms concurrently aggregate data from multiple sources and supply trust assessment of those sources, usually in a kind of corresponding weight factors allotted to data supplied by each source. To deal with this security issue, we advise a noticeable difference for iterative filtering techniques by supplying a preliminary approximation for such algorithms causing them to be not just collusion robust, but additionally better and faster converging

    ENDANGERED INFORMATION COMBINATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE OCCURRENCE OF COLLUSION ATTACKS

    Get PDF
    Iterative filtering algorithms hold great promise for this sort of purpose. Because of limited computational power and sources, aggregation of understanding from multiple sensor nodes finished in the aggregating node is generally accomplished by simple way of example averaging. During this paper we show several existing iterative filtering algorithms, while considerably greater quality against collusion attacks in comparison with simple averaging methods, are nonetheless susceptive having a novel sophisticated collusion attack we introduce. However such aggregation is called highly vulnerable to node compromising attacks. Because the performance of small power processors dramatically improves, future aggregator nodes will have a way to performing modern-day data aggregation algorithms, thus making WSN less vulnerable. Thus, ascertaining standing of knowledge and standing of sensor nodes is important for WSN. Such algorithms concurrently aggregate data from multiple sources and provide trust assessment of people sources, usually in a kind of corresponding weight factors utilized on data supplied by each source. To handle this security issue, we advise an apparent difference for iterative filtering techniques by providing a preliminary approximation for such algorithms which makes them not just collusion robust, but in addition better and faster converging

    Diffusion lms strategy over wireless sensor network

    Get PDF
    The mess with distributed detection, where nodes arranged in certain topology are obliged to decideamong two speculations focused around accessible estimations.We look for completely appropriated and versatile usage, where all nodes make singular constant-choices by putting crosswise over with their quick neighbours just, and no combination focus is vital. The proffered distributed detection algorithms are based on a concept of extension of strategies that are employed for diffusion mechanism in a distributed network topology. After a large-scale systematic plan or arrangement for attaining some particular object or putting a particular idea into effect detection using diffusion LMS are fascinating in the context of sensor networksbecause of their versatility, enhanced strength to node and connection disappointment as contrasted with unified frameworks and their capability to convey vitality and correspondence assets. The proposed algorithms are inherently adaptive and can track changes in the element speculation.We examine the operation of the suggested algorithms in terms of their chances of detection and false alarm, and provide simulation results comparing with other cooperation schemes, including centralized processing and the case where there is no cooperation. In the context of digital signal processing and communication, the role of adaptive filters is very vital. In day to daywork where practical requirement is necessary,the computational complexities is the most considerable parameter in context of an adaptive filter. As it tells us about reliability of any system, agility to real time environment least mean squares (LMS) algorithm is generally utilized in light of its low computational multifaceted nature (O(N)) and easier in implementation.

    Quality of Information in Mobile Crowdsensing: Survey and Research Challenges

    Full text link
    Smartphones have become the most pervasive devices in people's lives, and are clearly transforming the way we live and perceive technology. Today's smartphones benefit from almost ubiquitous Internet connectivity and come equipped with a plethora of inexpensive yet powerful embedded sensors, such as accelerometer, gyroscope, microphone, and camera. This unique combination has enabled revolutionary applications based on the mobile crowdsensing paradigm, such as real-time road traffic monitoring, air and noise pollution, crime control, and wildlife monitoring, just to name a few. Differently from prior sensing paradigms, humans are now the primary actors of the sensing process, since they become fundamental in retrieving reliable and up-to-date information about the event being monitored. As humans may behave unreliably or maliciously, assessing and guaranteeing Quality of Information (QoI) becomes more important than ever. In this paper, we provide a new framework for defining and enforcing the QoI in mobile crowdsensing, and analyze in depth the current state-of-the-art on the topic. We also outline novel research challenges, along with possible directions of future work.Comment: To appear in ACM Transactions on Sensor Networks (TOSN

    Wireless sensor data processing for on-site emergency response

    Get PDF
    This thesis is concerned with the problem of processing data from Wireless Sensor Networks (WSNs) to meet the requirements of emergency responders (e.g. Fire and Rescue Services). A WSN typically consists of spatially distributed sensor nodes to cooperatively monitor the physical or environmental conditions. Sensor data about the physical or environmental conditions can then be used as part of the input to predict, detect, and monitor emergencies. Although WSNs have demonstrated their great potential in facilitating Emergency Response, sensor data cannot be interpreted directly due to its large volume, noise, and redundancy. In addition, emergency responders are not interested in raw data, they are interested in the meaning it conveys. This thesis presents research on processing and combining data from multiple types of sensors, and combining sensor data with other relevant data, for the purpose of obtaining data of greater quality and information of greater relevance to emergency responders. The current theory and practice in Emergency Response and the existing technology aids were reviewed to identify the requirements from both application and technology perspectives (Chapter 2). The detailed process of information extraction from sensor data and sensor data fusion techniques were reviewed to identify what constitutes suitable sensor data fusion techniques and challenges presented in sensor data processing (Chapter 3). A study of Incident Commanders’ requirements utilised a goal-driven task analysis method to identify gaps in current means of obtaining relevant information during response to fire emergencies and a list of opportunities for WSN technology to fill those gaps (Chapter 4). A high-level Emergency Information Management System Architecture was proposed, including the main components that are needed, the interaction between components, and system function specification at different incident stages (Chapter 5). A set of state-awareness rules was proposed, and integrated with Kalman Filter to improve the performance of filtering. The proposed data pre-processing approach achieved both improved outlier removal and quick detection of real events (Chapter 6). A data storage mechanism was proposed to support timely response to queries regardless of the increase in volume of data (Chapter 7). What can be considered as “meaning” (e.g. events) for emergency responders were identified and a generic emergency event detection model was proposed to identify patterns presenting in sensor data and associate patterns with events (Chapter 8). In conclusion, the added benefits that the technical work can provide to the current Emergency Response is discussed and specific contributions and future work are highlighted (Chapter 9)

    Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures

    Get PDF
    Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, the security of IoT should start with foremost securing WSNs ahead of the other components. However, owing to the absence of a physical line-of-defense, i.e., there is no dedicated infrastructure such as gateways to watch and observe the flowing information in the network, security of WSNs along with IoT is of a big concern to the scientific community. More specifically, for the application areas in which CIA (confidentiality, integrity, availability) has prime importance, WSNs and emerging IoT technology might constitute an open avenue for the attackers. Besides, recent integration and collaboration of WSNs with IoT will open new challenges and problems in terms of security. Hence, this would be a nightmare for the individuals using these systems as well as the security administrators who are managing those networks. Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In this text, attacks are categorized and treated into mainly two parts, most or all types of attacks towards WSNs and IoT are investigated under that umbrella: “Passive Attacks” and “Active Attacks”. Understanding these attacks and their associated defense mechanisms will help paving a secure path towards the proliferation and public acceptance of IoT technology

    Security risk assessment in cloud computing domains

    Get PDF
    Cyber security is one of the primary concerns persistent across any computing platform. While addressing the apprehensions about security risks, an infinite amount of resources cannot be invested in mitigation measures since organizations operate under budgetary constraints. Therefore the task of performing security risk assessment is imperative to designing optimal mitigation measures, as it provides insight about the strengths and weaknesses of different assets affiliated to a computing platform. The objective of the research presented in this dissertation is to improve upon existing risk assessment frameworks and guidelines associated to different key assets of Cloud computing domains - infrastructure, applications, and users. The dissertation presents various informal approaches of performing security risk assessment which will help to identify the security risks confronted by the aforementioned assets, and utilize the results to carry out the required cost-benefit tradeoff analyses. This will be beneficial to organizations by aiding them in better comprehending the security risks their assets are exposed to and thereafter secure them by designing cost-optimal mitigation measures --Abstract, page iv

    Recent Trends in Communication Networks

    Get PDF
    In recent years there has been many developments in communication technology. This has greatly enhanced the computing power of small handheld resource-constrained mobile devices. Different generations of communication technology have evolved. This had led to new research for communication of large volumes of data in different transmission media and the design of different communication protocols. Another direction of research concerns the secure and error-free communication between the sender and receiver despite the risk of the presence of an eavesdropper. For the communication requirement of a huge amount of multimedia streaming data, a lot of research has been carried out in the design of proper overlay networks. The book addresses new research techniques that have evolved to handle these challenges
    corecore