25 research outputs found

    Energy efficient medium access control for wireless sensor networks

    Get PDF
    A wireless sensor network designates a system composed of numerous sensor nodes distributed over an area in order to collect information. The sensor nodes communicate wirelessly with each other in order to self-organize into a multi-hop network, collaborate in the sensing activity and forward the acquired information towards one or more users of the information. Applications of sensor networks are numerous, ranging from environmental monitoring, home and building automation to industrial control. Since sensor nodes are expected to be deployed in large numbers, they must be inexpensive. Communication between sensor nodes should be wireless in order to minimize the deployment cost. The lifetime of sensor nodes must be long for minimal maintenance cost. The most important consequence of the low cost and long lifetime requirements is the need for low power consumption. With today's technology, wireless communication hardware consumes so much power that it is not acceptable to keep the wireless communication interface constantly in operation. As a result, it is required to use a communication protocol with which sensor nodes are able to communicate keeping the communication interface turned-off most of the time. The subject of this dissertation is the design of medium access control protocols permitting to reach a very low power consumption when communicating at a low average throughput in multi-hop wireless sensor networks. In a first part, the performance of a scheduled protocol (time division multiple access, TDMA) is compared to the one of a contention protocol (non-persistent carrier sensing multiple access with preamble sampling, NP-CSMA-PS). The preamble sampling technique is a scheme that avoids constant listening to an idle medium. This thesis presents a low power contention protocol obtained through the combination of preamble sampling with non-persistent carrier sensing multiple access. The analysis of the strengths and weaknesses of TDMA and NP-CSMA-PS led us to propose a solution that exploits TDMA for the transport of frequent periodic data traffic and NP-CSMA-PS for the transport of sporadic signalling traffic required to setup the TDMA schedule. The second part of this thesis describes the WiseMAC protocol. This protocol is a further enhancement of CSMA with preamble sampling that proved to provide both a low power consumption in low traffic conditions and a high energy efficiency in high traffic conditions. It is shown that this protocol can provide either a power consumption or a latency several times lower that what is provided by previously proposed protocols. The WiseMAC protocol was initially designed for multi-hop wireless sensor networks. A comparison with power saving protocols designed specifically for the downlink of infrastructure wireless networks shows that it is also of interest in such cases. An implementation of the WiseMAC protocol has permitted to validate experimentally the proposed concepts and the presented analysis

    Packet Analysis of Unmodified Bluetooth Communication Devices

    Get PDF
    Bluetooth technology has potential for widespread use within the Department of Defense and the Air Force. An office environment using Bluetooth technology can wirelessly connect computers, printers, and other office equipment in order to share information over short distances. The clutter and annoyance of cables connecting equipment can be eliminated. Bluetooth provides a standard interface for connection, as opposed to many different proprietary cables. The research is conducted indoors in a climate controlled environment, with minimal obstructions, to closely follow free-space signal propagation. Four different antenna orientations are used. The factors varied are the distance between devices, and the antenna orientation. This research determined that two of the four cards tested have a specific distance where a change from Data High rate packets and Data Medium rate are used. The change occurs at 2 meters for one and 3 meters for the other. This research also shows that manufacturers transmit identical data in identical formats. Also, this research shows that antenna orientation, and receiver signal strength indicator values have no predictive value in determining packet type used for transmission

    Deteção de intrusões de rede baseada em anomalias

    Get PDF
    Dissertação de mestrado integrado em Eletrónica Industrial e ComputadoresAo longo dos últimos anos, a segurança de hardware e software tornou-se uma grande preocupação. À medida que a complexidade dos sistemas aumenta, as suas vulnerabilidades a sofisticadas técnicas de ataque têm proporcionalmente escalado. Frequentemente o problema reside na heterogenidade de dispositivos conectados ao veículo, tornando difícil a convergência da monitorização de todos os protocolos num único produto de segurança. Por esse motivo, o mercado requer ferramentas mais avançadas para a monitorizar ambientes críticos à vida humana, tais como os nossos automóveis. Considerando que existem várias formas de interagir com os sistemas de entretenimento do automóvel como o Bluetooth, o Wi-fi ou CDs multimédia, a necessidade de auditar as suas interfaces tornou-se uma prioridade, uma vez que elas representam um sério meio de aceeso à rede interna do carro. Atualmente, os mecanismos de segurança de um carro focam-se na monitotização da rede CAN, deixando para trás as tecnologias referidas e não contemplando os sistemas não críticos. Como exemplo disso, o Bluetooth traz desafios diferentes da rede CAN, uma vez que interage diretamente com o utilizador e está exposto a ataques externos. Uma abordagem alternativa para tornar o automóvel num sistema mais robusto é manter sob supervisão as comunicações que com este são estabelecidas. Ao implementar uma detecção de intrusão baseada em anomalias, esta dissertação visa analisar o protocolo Bluetooth no sentido de identificar interações anormais que possam alertar para uma situação fora dos padrões de utilização. Em última análise, este produto de software embebido incorpora uma grande margem de auto-aprendizagem, que é vital para enfrentar quaisquer ameaças desconhecidas e aumentar os níveis de segurança globais. Ao longo deste documento, apresentamos o estudo do problema seguido de uma metodologia alternativa que implementa um algoritmo baseado numa LSTM para prever a sequência de comandos HCI correspondentes a tráfego Bluetooth normal. Os resultados mostram a forma como esta abordagem pode impactar a deteção de intrusões nestes ambientes ao demonstrar uma grande capacidade para identificar padrões anómalos no conjunto de dados considerado.In the last few years, hardware and software security have become a major concern. As the systems’ complexity increases, its vulnerabilities to several sophisticated attack techniques have escalated likewise. Quite often, the problem lies in the heterogeneity of the devices connected to the vehicle, making it difficult to converge the monitoring systems of all existing protocols into one security product. Thereby, the market requires more refined tools to monitor life-risky environments such as personal vehicles. Considering that there are several ways to interact with the car’s infotainment system, such as Wi-fi, Bluetooth, or CD player, the need to audit these interfaces has become a priority as they represent a serious channel to reach the internal car network. Nowadays, security in car networks focuses on CAN bus monitoring, leaving behind the aforementioned technologies and not contemplating other non-critical systems. As an example of these concerns, Bluetooth brings different challenges compared to CAN as it interacts directly with the user, being exposed to external attacks. An alternative approach to converting modern vehicles and their set of computers into more robust systems is to keep track of established communications with them. By enforcing anomaly-based intrusion detection this dissertation aims to analyze the Bluetooth protocol to identify abnormal user interactions that may alert for a non conforming pattern. Ultimately, such embedded software product incorporates a self-learning edge, which is vital to face newly developed threats and increasing global security levels. Throughout this document, we present the study case followed by an alternative methodology that implements an LSTM based algorithm to predict a sequence of HCI commands corresponding to normal Bluetooth traffic. The results show how this approach can impact intrusion detection in such environments by expressing a high capability of identifying abnormal patterns in the considered data

    Co-existence of wireless communication systems in ISM bands: An analytical study

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Wireless Sensor Technology Selection for I4.0 Manufacturing Systems

    Get PDF
    The term smart manufacturing has surfaced as an industrial revolution in Germany known as Industry 4.0 (I4.0); this revolution aims to help the manufacturers adapt to turbulent market trends. Its main scope is implementing machine communication, both vertically and horizontally across the manufacturing hierarchy through Internet of things (IoT), technologies and servitization concepts. The main objective of this research is to help manufacturers manage the high levels of variety and the extreme turbulence of market trends through developing a selection tool that utilizes Analytic Hierarchy Process (AHP) techniques to recommend a suitable industrial wireless sensor network (IWSN) technology that fits their manufacturing requirements.In this thesis, IWSN technologies and their properties were identified, analyzed and compared to identify their potential suitability for different industrial manufacturing system application areas. The study included the identification and analysis of different industrial system types, their application areas, scenarios and respective communication requirements. The developed tool’s sensitivity is also tested to recommend different IWSN technology options with changing influential factors. Also, a prioritizing protocol is introduced in the case where more than one IWSN technology options are recommended by the AHP tool.A real industrial case study with the collaboration of SPM Automation Inc. is presented, where the industrial systems’ class, communication traffic types, and communication requirements were analyzed to recommend a suitable IWSN technology that fits their requirements and assists their shift towards I4.0 through utilizing AHP techniques. The results of this research will serve as a step forward, in the transformation process of manufacturing towards a more digitalized and better connected cyber-physical systems; thus, enhancing manufacturing attributes such as flexibility, reconfigurability, scalability and easing the shift towards implementing I4.0

    End-to-end security for mobile devices

    Get PDF
    Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2004Includes bibliographical references (leaves: 120)Text in English; Abstract: Turkish and Englishix, 133 leavesEnd-to-end security has been an emerging need for mobile devices with the widespread use of personal digital assistants and mobile phones. Transport Layer Security Protocol (TLS) is an end-to-end security protocol that is commonly used in Internet, together with its predecessor, SSL protocol. By using TLS protocol in mobile world, the advantage of the proven security model of this protocol can be taken.J2ME (Java 2 Micro Edition) has been the de facto application platform used in mobile devices. This thesis aims to provide an end-to-end security protocol implementation based on TLS 1.0 specification and that can run on J2ME MIDP (Mobile Information Device Profile) environment. Because of the resource intensive public-key operations used in TLS, this protocol needs high resources and has low performance. Another motivation for the thesis is to adapt the protocol for mobile environment and to show that it is possible to use the protocol implementation in both client and server modes. An alternative serialization mechanism is used instead of the standard Java object serialization that is lacking in MIDP. In this architecture, XML is used to transmit object data.The mobile end-to-end security protocol has the main design issues of maintainability and extensibility. Cryptographic operations are performed with a free library, Bouncy Castle Cryptography Package. The object-oriented architecture of the protocol implementation makes the replacement of this library with another cryptography package easier.Mobile end-to-end security protocol is tested with a mobile hospital reservation system application. Test cases are prepared to measure the performance of the protocol implementation with different cipher suites and platforms. Measured values of all handshake operation and defined time spans are given in tables and compared with graphs

    Real-time wireless networks for industrial control systems

    Get PDF
    The next generation of industrial systems (Industry 4.0) will dramatically transform manyproductive sectors, integrating emerging concepts such as Internet of Things, artificialintelligence, big data, cloud robotics and virtual reality, to name a few. Most of thesetechnologies heavily rely on the availability of communication networks able to offernearly–istantaneous, secure and reliable data transfer. In the industrial sector, these tasks are nowadays mainly accomplished by wired networks, that combine the speed ofoptical fiber media with collision–free switching technology. However, driven by the pervasive deployment of mobile devices for personal com-munications in the last years, more and more industrial applications require wireless connectivity, which can bring enormous advantages in terms of cost reduction and flex-ibility. Designing timely, reliable and deterministic industrial wireless networks is a complicated task, due to the nature of the wireless channel, intrinsically error–prone andshared among all the devices transmitting on the same frequency band. In this thesis, several solutions to enhance the performance of wireless networks employed in industrial control applications are proposed. The presented approaches differ in terms of achieved performance and target applications, but they are all characterized by an improvement over existing industrial wireless solutions in terms of timeliness, reliability and determinism. When possible, an experimental validation of the designed solutions is provided. The obtained results prove that significant performance improvements are already possible, often using commercially available devices and preserving compliance to existing standards. Future research efforts, combined with the availability of new chipsets and standards, could lead to a world where wireless links effectively replace most of the existing cables in industrial environments, as it is already the case in the consumer market

    Security in Distributed, Grid, Mobile, and Pervasive Computing

    Get PDF
    This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security

    System support for client-server based interactive applications in ad hoc networks

    Get PDF
    With the emergence of wireless communications and mobile computing. new ways for people to interact with each other and their surrounding environment are emerging. Mobile devices, such as Personal Digital Assistants (PDAs) with wireless communication interfaces are able to communicate directly with each other if they are "close enough". If such devices are also able to act as message relays (routers), then a very powerful facility in the form of a mobile ad hoc network can be made available to applications. Although present day PDAs have sufficient networking and processing capabilities to support interesting interactive applications, as yet, there is hardly any software available for constructing and maintaining ad hoc networks and not many practical interactive applications have been built and tested. Rather, much of the research work is still at simulation and modelling stage. Thus it is difficult at this stage to decide what system support (middleware) for interactive applications a PDA should contain. This work is a step in the direction of remedying the situation by considering a class of applications where interactions between users can be supported by one of the nodes in the ad hoc network acting as a server. The thesis presents the design, implementation and evaluation of three such applications on PDAs, and based on that experience, describes what system support (middleware) for such applications is required. These applications are: Auction, Bingo game and Chatting that work over ad hoc networks. The work presented here can be used as a basis for deciding how the current generation of PDA operating systems can be extended for supporting ad hoc networking and what additional services are required for interactive applications.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
    corecore