5,220 research outputs found
An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations
With the expansion of wireless sensor networks (WSNs), the need for securing
the data flow through these networks is increasing. These sensor networks allow
for easy-to-apply and flexible installations which have enabled them to be used
for numerous applications. Due to these properties, they face distinct
information security threats. Security of the data flowing through across
networks provides the researchers with an interesting and intriguing potential
for research. Design of these networks to ensure the protection of data faces
the constraints of limited power and processing resources. We provide the
basics of wireless sensor network security to help the researchers and
engineers in better understanding of this applications field. In this chapter,
we will provide the basics of information security with special emphasis on
WSNs. The chapter will also give an overview of the information security
requirements in these networks. Threats to the security of data in WSNs and
some of their counter measures are also presented
Continuum Equilibria and Global Optimization for Routing in Dense Static Ad Hoc Networks
We consider massively dense ad hoc networks and study their continuum limits
as the node density increases and as the graph providing the available routes
becomes a continuous area with location and congestion dependent costs. We
study both the global optimal solution as well as the non-cooperative routing
problem among a large population of users where each user seeks a path from its
origin to its destination so as to minimize its individual cost. Finally, we
seek for a (continuum version of the) Wardrop equilibrium. We first show how to
derive meaningful cost models as a function of the scaling properties of the
capacity of the network and of the density of nodes. We present various
solution methodologies for the problem: (1) the viscosity solution of the
Hamilton-Jacobi-Bellman equation, for the global optimization problem, (2) a
method based on Green's Theorem for the least cost problem of an individual,
and (3) a solution of the Wardrop equilibrium problem using a transformation
into an equivalent global optimization problem
Proactive Highly Ambulatory Sensor Routing (PHASeR) protocol for mobile wireless sensor networks
This paper presents a novel multihop routing protocol for mobile wireless sensor networks called PHASeR (Proactive Highly Ambulatory Sensor Routing). The proposed protocol
uses a simple hop-count metric to enable the dynamic and robust routing of data towards the sink in mobile environments. It is motivated by the application of radiation mapping by unmanned vehicles, which requires the reliable and timely delivery of regular measurements to the sink. PHASeR maintains a gradient metric in mobile environments by using a global TDMA MAC layer. It also uses the technique of blind forwarding to pass messages through the network in a multipath manner. PHASeR is analysed mathematically based on packet delivery ratio, average packet delay, throughput and overhead. It is then simulated with varying mobility, scalability and traffic loads. The protocol gives good results over all measures, which suggests that it may also be suitable for a wider array of emerging applications
Flow Allocation for Maximum Throughput and Bounded Delay on Multiple Disjoint Paths for Random Access Wireless Multihop Networks
In this paper, we consider random access, wireless, multi-hop networks, with
multi-packet reception capabilities, where multiple flows are forwarded to the
gateways through node disjoint paths. We explore the issue of allocating flow
on multiple paths, exhibiting both intra- and inter-path interference, in order
to maximize average aggregate flow throughput (AAT) and also provide bounded
packet delay. A distributed flow allocation scheme is proposed where allocation
of flow on paths is formulated as an optimization problem. Through an
illustrative topology it is shown that the corresponding problem is non-convex.
Furthermore, a simple, but accurate model is employed for the average aggregate
throughput achieved by all flows, that captures both intra- and inter-path
interference through the SINR model. The proposed scheme is evaluated through
Ns2 simulations of several random wireless scenarios. Simulation results reveal
that, the model employed, accurately captures the AAT observed in the simulated
scenarios, even when the assumption of saturated queues is removed. Simulation
results also show that the proposed scheme achieves significantly higher AAT,
for the vast majority of the wireless scenarios explored, than the following
flow allocation schemes: one that assigns flows on paths on a round-robin
fashion, one that optimally utilizes the best path only, and another one that
assigns the maximum possible flow on each path. Finally, a variant of the
proposed scheme is explored, where interference for each link is approximated
by considering its dominant interfering nodes only.Comment: IEEE Transactions on Vehicular Technolog
- …