23,507 research outputs found

    Group-Based Key Management Protocol for Energy Efficiency in Long-Lived and Large-Scale Distributed Sensor Networks

    Get PDF
    As wireless sensor networks grow, so does the need for effective security mechanisms. We propose a cryptographic key-management protocol, called energy-efficient key-management (EEKM) protocol. Using a location-based group key scheme, the protocol supports the revocation of compromised nodes and energy-efficient rekeying. The design is motivated by the observation that unicast-based rekeying does not meet the security requirements of periodic rekeying in long-lived wireless sensor networks. EEKM supports broadcast-based rekeying for low-energy key management and high resilience. In addition, to match the increasing complexity of encryption keys, the protocol uses a dynamic composition key scheme. EEKM also provides group-management protocols for secure group communication. We analyzed the energy efficiency and security of EEKM and compared it to other key-management protocols using a network simulator

    Exploring Link Correlation for Performance Improvements in Wireless Networks

    Get PDF
    University of Minnesota Ph.D. dissertation. February 2017. Major: Computer Science. Advisor: Tian He. 1 computer file (PDF); x, 96 pages.In wireless communication, many technologies, such as Wi-Fi, BlueTooth and ZigBee, operate in the same ISM band. With the exponential growth of wireless devices, the ISM band becomes more and more crowded. These wireless devices compete with each other to access spectrum resources, generating cross-technology interference (CTI). Since cross-technology interference may destroy wireless communication, the field is facing an urgent and challenging need to investigate the packet reception quality of wireless links under CTI. In this dissertation, we propose an in-depth systematic study from empirical measurement, theoretical analysis, modeling, to design and implementation of protocols that exploit packet reception patterns of wireless links under cross-technology interference. Based on extensive measurements, we exploit link correlation phenomenon that packet receptions from a transmitter to multiple receivers are correlated. We then propose link correlation model which contradicts the widely made link independent assumption. The proposed model has a broad impact on network designs that utilize concurrent wireless links, which include (i) traditional network protocols such as broadcast, and (ii) diversity-based protocols such as network coding and opportunistic routing. In the study of the impact of link correlation model on traditional network protocols, we present the design and implementation of CorLayer, a general supporting layer for energy efficient reliable broadcast that carefully blacklists certain poorly correlated wireless links. We integrate CorLayer transparently with sixteen state-of-the-art broadcast protocols specified in thirteen publications on three physical testbeds running TelosB, MICAz, and GreenOrbs nodes, respectively. The experimental results show that CorLayer remarkably improves energy efficiency across a wide spectrum of broadcast protocols and that the total number of packet transmissions can be reduced consistently by 47% on average. In the study of the impact of link correlation model on diversity-based protocols, we propose link correlation aware network coding and link correlation aware opportunistic routing. In link correlation aware network coding, we introduce Correlated Coding which seeks to optimize the transmission efficiency by maximizing necessary coding opportunities. In link correlation aware opportunistic routing, we propose a novel candidate forwarder selection algorithm to help opportunistic routing fully exploit the diversity benefit of the wireless broadcast medium. Testbed evaluation and extensive simulation show that the traditional network coding and opportunistic routing protocols’ transmission efficiency is significantly improved with our link correlation model

    Performance assessment of ESP8266 Wireless Mesh Networks

    Get PDF
    Wireless mesh networking (WMN) is a continuous growing technology that has an important role towards the vision of smart agriculture. This work presents the setup and performance assessment of a wireless mesh network testbed developed within the context of PrunusPós project to collect data such as temperature and humidity of fruit crates or containers when stored or transported in refrigerated chambers. The testbed is based on ESP8266 devices connected in a wireless mesh using the painlessMesh library. A performance evaluation study was conducted with different numbers of nodes, traffic loads, and message payload sizes under unicast and broadcast communication. The impact on network performance is evaluated in terms of delivery ratio and delivery delay. This study will guide the future development of mechanisms, schemes and protocols that provide efficient bandwidth utilization and energy-efficient computing for the PrunusPós project WMN.info:eu-repo/semantics/publishedVersio

    A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks

    Full text link
    This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanismsComment: 15 page

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks

    Get PDF
    This chapter discusses the need of security and privacy protection mechanisms in aggregation protocols used in wireless sensor networks (WSN). It presents a comprehensive state of the art discussion on the various privacy protection mechanisms used in WSNs and particularly focuses on the CPDA protocols proposed by He et al. (INFOCOM 2007). It identifies a security vulnerability in the CPDA protocol and proposes a mechanism to plug that vulnerability. To demonstrate the need of security in aggregation process, the chapter further presents various threats in WSN aggregation mechanisms. A large number of existing protocols for secure aggregation in WSN are discussed briefly and a protocol is proposed for secure aggregation which can detect false data injected by malicious nodes in a WSN. The performance of the protocol is also presented. The chapter concludes while highlighting some future directions of research in secure data aggregation in WSNs.Comment: 32 pages, 7 figures, 3 table

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table
    corecore