4,138 research outputs found

    Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Get PDF
    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    Energy Efficient Elliptical Curve based Spherical Grid Routing Protocol for Wireless Sensor Networks

    Get PDF
    The Wireless Sensor Network (WSN) is a collection of no. of mobile nodes which communicate through wireless channel without any existing network infrastructure. Because the resource constrained nature of WSN a data packet routing requires multiple hops to exchange data across the network. In order to facilitate communication within the network, a secure energy efficient routing protocol is used to discover routes between nodes. The proposed energy efficient elliptical curve based spherical grid routing protocol for WSN provides correct and efficient route establishment between a pair of nodes so that data packets can be delivered in time to the destination. Secure route construction can be done with optimized WSN performance matrices such as packet delivery ratio, throughput, minimum energy consumptions, communication overhead

    Improved energy aware cluster based data routing scheme for WSN

    Get PDF
    Wireless sensor network (WSN) consists of several tiny devices that are dispersed randomly for gathering network field. Clustering mechanism divides the WSN into different sub-regions called clusters. Individual cluster is consisting of cluster head (CH) and member nodes. The main research challenges behind clustering mechanism are to optimize network overheads with efficient data delivery. Sensor nodes are operated by batteries and practically it is not feasible to replace them during sensing the environment so energy should be effectively utilized among sensors for improving overall network performance. This research paper presents an improved energy aware cluster based data routing (i-ECBR) scheme, by dividing the network regions into uniform sized square partitions and localized CH election mechanism. In addition, consistent end-to-end data routing is performed for improving data dissemination. Simulation results illustrate that our proposed scheme outperforms than existing work in terms of different performance metrics
    • …
    corecore