677 research outputs found

    Steganography in {MAC} Layers of 802.15.4 Protocol for securing Wireless Sensor Networks

    No full text
    International audienceIn many applications, wireless sensor networks need to secure information. Actual researchs found efficient solutions for this kind of network, principally by using cryptography to secure the data transfer. However an encrypted information send by the network can be sufficient to prevent an attacker, who eavesdrops the network, that something important has been detected. To avoid this situation, we propose another way to secure wireless sensor networks by using steganography, specifically by hiding data in the MAC layer of the 802.15.4 protocol.We show that this solution can be an energy-efficient way with a good latency to hide data in a wireless sensor network

    On demand multicast routing in wireless sensor networks

    Get PDF
    The wireless networking environment presents imposing challenges to the study of broadcasting and multicasting problems. Developing an algorithm to optimize communication amongst a group of spatially distributed sensor nodes in a WSN (Wireless Sensor Network) has been met with a number challenges due to the characterization of the sensor node device. These challenges include, but are not limited to: energy, memory, and throughput constraints. The traditional approach to overcome these challenges have emphasised the development of low power electronics, efficient modulation, coding, antenna design etc., it has been recognised that networking techniques can also have a strong impact on the energy efficiency of such systems. A variety of networking based approaches to energy efficiency are possible. One of the well-known approaches is to apply clustering techniques to effectively establish an ordered connection of sensor nodes whilst improving the overall network lifetime. This paper proposes an improved clustering based multicast approach that allows any cluster head to be a multicast source with an unlimited number of subscribers, to optimize group communication in WSNs whilst ensuring sensor nodes do not deprecate rapidly in energy levels. We review several clustering approaches and examine multicast versus broadcast communication in WSNs

    On demand multicast routing in wireless sensor networks

    Get PDF
    The wireless networking environment presents imposing challenges to the study of broadcasting and multicasting problems. Developing an algorithm to optimize communication amongst a group of spatially distributed sensor nodes in a WSN (Wireless Sensor Network) has been met with a number challenges due to the characterization of the sensor node device. These challenges include, but are not limited to: energy, memory, and throughput constraints. The traditional approach to overcome these challenges have emphasised the development of low power electronics, efficient modulation, coding, antenna design etc., it has been recognised that networking techniques can also have a strong impact on the energy efficiency of such systems. A variety of networking based approaches to energy efficiency are possible. One of the well-known approaches is to apply clustering techniques to effectively establish an ordered connection of sensor nodes whilst improving the overall network lifetime. This paper proposes an improved clustering based multicast approach that allows any cluster head to be a multicast source with an unlimited number of subscribers, to optimize group communication in WSNs whilst ensuring sensor nodes do not deprecate rapidly in energy levels. We review several clustering approaches and examine multicast versus broadcast communication in WSNs

    Wireless Sensor Networks (WSNs): Security and Privacy Issues and Solutions

    Get PDF
    Wireless sensor networks (WSNs) have become one of the current research areas, and it proves to be a very supportive technology for various applications such as environmental-, military-, health-, home-, and office-based applications. WSN can either be mobile wireless sensor network (MWSN) or static wireless sensor network (SWSN). MWSN is a specialized wireless network consisting of considerable number of mobile sensors, however the instability of its topology introduces several performance issues during data routing. SWSNs consisting of static nodes with static topology also share some of the security challenges of MWSNs due to some constraints associated with the sensor nodes. Security, privacy, computation and energy constraints, and reliability issues are the major challenges facing WSNs, especially during routing. To solve these challenges, WSN routing protocols must ensure confidentiality, integrity, privacy preservation, and reliability in the network. Thus, efficient and energy-aware countermeasures have to be designed to prevent intrusion in the network. In this chapter, we describe different forms of WSNs, challenges, solutions, and a point-to-point multi-hop-based secure solution for effective routing in WSNs

    MODLEACH: A Variant of LEACH for WSNs

    Full text link
    Wireless sensor networks are appearing as an emerging need for mankind. Though, Such networks are still in research phase however, they have high potential to be applied in almost every field of life. Lots of research is done and a lot more is awaiting to be standardized. In this work, cluster based routing in wireless sensor networks is studied precisely. Further, we modify one of the most prominent wireless sensor network's routing protocol "LEACH" as modified LEACH (MODLEACH) by introducing \emph{efficient cluster head replacement scheme} and \emph{dual transmitting power levels}. Our modified LEACH, in comparison with LEACH out performs it using metrics of cluster head formation, through put and network life. Afterwards, hard and soft thresholds are implemented on modified LEACH (MODLEACH) that boast the performance even more. Finally a brief performance analysis of LEACH, Modified LEACH (MODLEACH), MODLEACH with hard threshold (MODLEACHHT) and MODLEACH with soft threshold (MODLEACHST) is undertaken considering metrics of throughput, network life and cluster head replacements.Comment: IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, Franc

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    Cost over Progress Based Energy-efficient Routing Protocol over Virtual Coordinates in Wireless Sensor Networks

    Get PDF
    National audienceDans un réseau sans fil (réseau ad hoc ou de capteurs), la durée de vie du réseau est dépendante des batteries des noeuds. Ainsi, utiliser des protocoles qui minimisent la consommation énergétique s'avère important. Dans cet article, nous supposons que les noeuds ne connaissent pas leurs coordonnées géographiques. Nous proposons un protocole de routage VCost basé sur un système de coordonnées virtuelles qui minimise la consommation énergétique à chaque saut. Il s'avère que VCost améliore grandement la consommation énergétique par rapport à d'autres protocoles de routage basés sur des coordonnées virtuelles tout en égalant leur taux de livraison

    Management of Real Time Constraints in Sensor Networks

    No full text
    International audienceThe scope of this paper is to compare existing techniques proposed to manage real time (RT) communications in wireless sensor networks. MAC, network or cross layer solutions are presented and discussed in order to draw up a global view of system designs. Identifying drawbacks of existing works allows drawing future directions concerning QoS guaranteeing data delivery under time constraints

    Energy Optimization based on the Redundancy in WSNs

    Get PDF
    International audienceAlmost all WSNs (Wireless Sensor Networks) are deployed with some redundancy degree and redundancy is used only for robustness objectives. If not handled in an intelligent way, redundancy results in energy wasting because of (often unnecessary) redundant transmission and reception operations. We propose to take benefit from measurement redundancy to optimize the energy consumption and improve the end-to-end delay. We propose MR-LEACH (Measurement Redundancy aware LEACH) protocol, which is an extension to the well-known LEACH protocol to improve energy consumption in cluster-based WSNs. In addition to cluster formation according to LEACH protocol redundant nodes are grouped taking into account their redundancy and only a single node transmits data in each redundant group. This technique significantly improves the energy consumption and ensures a better end-to-end delay. Through intensive simulations, we discuss the performance of our approach and show how it outperforms the original LEACH protocol in terms of network lifetime and end-to-end delay
    • …
    corecore