552 research outputs found
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Biologically inspired, self organizing communication networks.
PhDThe problem of energy-efficient, reliable, accurate and self-organized target tracking in
Wireless Sensor Networks (WSNs) is considered for sensor nodes with limited physical
resources and abrupt manoeuvring mobile targets. A biologically inspired, adaptive
multi-sensor scheme is proposed for collaborative Single Target Tracking (STT) and
Multi-Target Tracking (MTT). Behavioural data obtained while tracking the targets
including the targets’ previous locations is recorded as metadata to compute the target
sampling interval, target importance and local monitoring interval so that tracking
continuity and energy-efficiency are improved. The subsequent sensor groups that track
the targets are selected proactively according to the information associated with the
predicted target location probability such that the overall tracking performance is
optimized or nearly-optimized. One sensor node from each of the selected groups is
elected as a main node for management operations so that energy efficiency and load
balancing are improved. A decision algorithm is proposed to allow the “conflict” nodes
that are located in the sensing areas of more than one target at the same time to decide
their preferred target according to the target importance and the distance to the target. A
tracking recovery mechanism is developed to provide the tracking reliability in the
event of target loss.
The problem of task mapping and scheduling in WSNs is also considered. A
Biological Independent Task Allocation (BITA) algorithm and a Biological Task
Mapping and Scheduling (BTMS) algorithm are developed to execute an application
using a group of sensor nodes. BITA, BTMS and the functional specialization of the
sensor groups in target tracking are all inspired from biological behaviours of
differentiation in zygote formation.
Simulation results show that compared with other well-known schemes, the
proposed tracking, task mapping and scheduling schemes can provide a significant
improvement in energy-efficiency and computational time, whilst maintaining
acceptable accuracy and seamless tracking, even with abrupt manoeuvring targets.Queen Mary university of London full Scholarshi
Coverage Protocols for Wireless Sensor Networks: Review and Future Directions
The coverage problem in wireless sensor networks (WSNs) can be generally
defined as a measure of how effectively a network field is monitored by its
sensor nodes. This problem has attracted a lot of interest over the years and
as a result, many coverage protocols were proposed. In this survey, we first
propose a taxonomy for classifying coverage protocols in WSNs. Then, we
classify the coverage protocols into three categories (i.e. coverage aware
deployment protocols, sleep scheduling protocols for flat networks, and
cluster-based sleep scheduling protocols) based on the network stage where the
coverage is optimized. For each category, relevant protocols are thoroughly
reviewed and classified based on the adopted coverage techniques. Finally, we
discuss open issues (and recommend future directions to resolve them)
associated with the design of realistic coverage protocols. Issues such as
realistic sensing models, realistic energy consumption models, realistic
connectivity models and sensor localization are covered
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
Location based services in wireless ad hoc networks
In this dissertation, we investigate location based services in wireless ad hoc networks from four different aspects - i) location privacy in wireless sensor networks (privacy), ii) end-to-end secure communication in randomly deployed wireless sensor networks (security), iii) quality versus latency trade-off in content retrieval under ad hoc node mobility (performance) and iv) location clustering based Sybil attack detection in vehicular ad hoc networks (trust). The first contribution of this dissertation is in addressing location privacy in wireless sensor networks. We propose a non-cooperative sensor localization algorithm showing how an external entity can stealthily invade into the location privacy of sensors in a network. We then design a location privacy preserving tracking algorithm for defending against such adversarial localization attacks. Next we investigate secure end-to-end communication in randomly deployed wireless sensor networks. Here, due to lack of control on sensors\u27 locations post deployment, pre-fixing pairwise keys between sensors is not feasible especially under larger scale random deployments. Towards this premise, we propose differentiated key pre-distribution for secure end-to-end secure communication, and show how it improves existing routing algorithms. Our next contribution is in addressing quality versus latency trade-off in content retrieval under ad hoc node mobility. We propose a two-tiered architecture for efficient content retrieval in such environment. Finally we investigate Sybil attack detection in vehicular ad hoc networks. A Sybil attacker can create and use multiple counterfeit identities risking trust of a vehicular ad hoc network, and then easily escape the location of the attack avoiding detection. We propose a location based clustering of nodes leveraging vehicle platoon dispersion for detection of Sybil attacks in vehicular ad hoc networks --Abstract, page iii
Securing a wireless sensor network for human tracking: a review of solutions
Currently, wireless sensor networks (WSNs) are formed by devices with limited resources and limited
power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless
sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For
many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real
applications, a trade-off is required between the security level and energy consumption. This paper
evaluates different security schemes applied to human tracking applications, based on a real-case scenario.Junta de AndalucĂa P07-TIC-02476Junta de AndalucĂa TIC-570
- …