360 research outputs found

    H-NAMe: specifying, implementing and testing a hidden-node avoidance mechanism for wireless sensor networks

    Get PDF
    The hidden-node problem has been shown to be a major source of Quality-of-Service (QoS) degradation in Wireless Sensor Networks (WSNs) due to factors such as the limited communication range of sensor nodes, link asymmetry and the characteristics of the physical environment. In wireless contention-based Medium Access Control protocols, if two nodes that are not visible to each other transmit to a third node that is visible to the formers, there will be a collision – usually called hidden-node or blind collision. This problem greatly affects network throughput, energy-efficiency and message transfer delays, which might be particularly dramatic in large-scale WSNs. This technical report tackles the hidden-node problem in WSNs and proposes HNAMe, a simple yet efficient distributed mechanism to overcome it. H-NAMe relies on a grouping strategy that splits each cluster of a WSN into disjoint groups of non-hidden nodes and then scales to multiple clusters via a cluster grouping strategy that guarantees no transmission interference between overlapping clusters. We also show that the H-NAMe mechanism can be easily applied to the IEEE 802.15.4/ZigBee protocols with only minor add-ons and ensuring backward compatibility with the standard specifications. We demonstrate the feasibility of H-NAMe via an experimental test-bed, showing that it increases network throughput and transmission success probability up to twice the values obtained without H-NAMe. We believe that the results in this technical report will be quite useful in efficiently enabling IEEE 802.15.4/ZigBee as a WSN protocol

    H-NAMe: a hidden-node avoidance mechanism for wireless sensor networks

    Get PDF
    The hidden-node problem has been shown to be a major source of Quality-of-Service (QoS) degradation in Wireless Sensor Networks (WSNs) due to factors such as the limited communication range of sensor nodes, link asymmetry and the characteristics of the physical environment. In wireless contention-based Medium Access Control protocols, if two nodes that are not visible to each other transmit to a third node that is visible to the formers, there will be a collision – usually called hidden-node or blind collision. This problem greatly affects network throughput, energy-efficiency and message transfer delays, which might be particularly dramatic in large-scale WSNs. This paper tackles the hiddennode problem in WSNs and proposes H-NAMe, a simple yet efficient distributed mechanism to overcome it. H-NAMe relies on a grouping strategy that splits each cluster of a WSN into disjoint groups of non-hidden nodes and then scales to multiple clusters via a cluster grouping strategy that guarantees no transmission interference between overlapping clusters. We also show that the H-NAMe mechanism can be easily applied to the IEEE 802.15.4/ZigBee protocols with only minor add-ons and ensuring backward compatibility with the standard specifications. We demonstrate the feasibility of H-NAMe via an experimental test-bed, showing that it increases network throughput and transmission success probability up to twice the values obtained without H-NAMe. We believe that the results in this paper will be quite useful in efficiently enabling IEEE 802.15.4/ZigBee as a WSN protoco

    Improving the communication reliability of body sensor networks based on the IEEE 802.15.4 protocol

    Get PDF
    Body sensor networks (BSNs) enable continuous monitoring of patients anywhere, with minimum constraints to daily life activities. Although the IEEE 802.15.4 and ZigBee® (ZigBee Alliance, San Ramon, CA) standards were mainly developed for use in wireless sensors network (WSN) applications, they are also widely used in BSN applications because of device characteristics such as low power, low cost, and small form factor. However, compared with WSNs, BSNs present some very distinctive characteristics in terms of traffic and mobility patterns, heterogeneity of the nodes, and quality of service requirements. This article evaluates the suitability of the carrier sense multiple access–collision avoidance protocol, used by the IEEE 802.15.4 and ZigBee standards, for data-intensive BSN applications, through the execution of experimental tests in different evaluation scenarios, in order to take into account the effects of contention, clock drift, and hidden nodes on the communication reliability. Results show that the delivery ratio may decrease substantially during transitory periods, which can last for several minutes, to a minimum of 90% with retransmissions and 13% without retransmissions. This article also proposes and evaluates the performance of the BSN contention avoidance mechanism, which was designed to solve the identified reliability problems. This mechanism was able to restore the delivery ratio to 100% even in the scenario without retransmissions.Fundação para a Ciência e a Tecnologia (FCT

    Evaluation of the impact of the topology and Hidden Nodes in the performance of a ZigBee Network

    Get PDF
    Low power and small footprint IEEE 802.15.4/ZigBee based devices are a promising alternative to 802.11a/b/g and proprietary protocols for non-critical patient monitoring under important scenarios such as post-op and emergency rooms. However, their use in a healthcare facility to monitor several mobile patients poses several difficulties, mainly because these protocols were primarily designed to operate in low traffic load scenarios. This work presents simulation results used to evaluate the performance of an IEEE 802.15.4/ Zig- Bee based wireless sensors network (WSN) in a vital signs monitoring scenario, for both star and tree based network topologies. The scalability problem in nonbeacon enabled networks is addressed to quantify the degradation in quality of service (QoS) markers when the number of sensor nodes increase. Additionally, the impact of hidden nodes is assessed for the star topology. Results indicate that, to achieve a delivery ratio (DR) higher than 99%, the number of electrocardiogram (ECG) nodes in a star network must not exceed 35. However, considering a tree topology, the maximum number of nodes must be reduced to 18 to maintain the same DR. The network performance is severely impacted by hidden nodes. For instance, in the absence of hidden nodes, a star network consisting of 32 ECG nodes presents a DR higher than 99%; however, if the percentage of hidden nodes is increased to 5%, it drops to 94%. If the same percentage of hidden nodes is maintained, it is necessary to reduce the number of nodes to 13 to reestablish a 99% DR.Fundação para a Ciência e a Tecnologia (FCT)Grupo AMI - Assistência Médica Integral (Casa de Saúde Guimarães, SA

    Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks

    Get PDF
    A wireless sensor network (WSN) is an ad-hoc technology that may even consist of thousands of nodes, which necessitates autonomic, self-organizing and multihop operations. A typical WSN node is battery powered, which makes the network lifetime the primary concern. The highest energy efficiency is achieved with low duty cycle operation, however, this alone is not enough. WSNs are deployed for different uses, each requiring acceptable Quality of Service (QoS). Due to the unique characteristics of WSNs, such as dynamic wireless multihop routing and resource constraints, the legacy QoS metrics are not feasible as such. We give a new definition to measure and implement QoS in low duty cycle WSNs, namely availability and reliability. Then, we analyze the effect of duty cycling for reaching the availability and reliability. The results are obtained by simulations with ZigBee and proprietary TUTWSN protocols. Based on the results, we also propose a data forwarding algorithm suitable for resource constrained WSNs that guarantees end-to-end reliability while adding a small overhead that is relative to the packet error rate (PER). The forwarding algorithm guarantees reliability up to 30% PER

    On the use of IEEE 802.15.4/Zigbee for time-sensitive wireless sensor network applications

    Get PDF
    Mestrado em Engenharia Electrotécnica e de ComputadoresRecent advancements in information and communication technologies are paving the way for new paradigms in embedded computing systems. This, allied with an increasing eagerness for monitoring and controlling everything, everywhere, is pushing forward the design of new Wireless Sensor Network (WSN) infrastructures that will tightly interact with the physical environment, in a ubiquitous and pervasive fashion. Such cyber-physical systems require a rethinking of the usual computing and networking concepts, and given that the computing entities closely interact with their environment, timeliness is of increasing importance. This Thesis addresses the use of standard protocols, particularly IEEE 802.15.4 and ZigBee, combined with commercial technologies as a baseline to enable WSN infrastructures capable of supporting the Quality of Service (QoS) requirements (specially timeliness and system lifetime) that future large-scale networked embedded systems will impose. With this purpose, in this Thesis we start by evaluating the network performance of the IEEE 802.15.4 Slotted CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism for different parameter settings, both through simulation and through an experimental testbed. In order to improve the performance of these networks (e.g. throughput, energyefficiency, message delay) against the hidden-terminal problem, a mechanism to mitigate it was implemented and experimentally validated. The effectiveness of this mechanism was also demonstrated in a real application scenario, featuring a target tracking application. A methodology for modelling cluster-tree WSNs and computing the worst-case endto-end delays, buffering and bandwidth requirements was tested and validated experimentally. This work is of paramount importance to understand the behaviour of WSNs under worst-case conditions and also to make the appropriate network settings. Our experimental work enabled us to identify a number of technological constrains, namely related to hardware/software and to the Open-ZB implementation in TinyOS. In this line, a new implementation effort was triggered to port the Open-ZB IEEE 802.15.4/ZigBee protocol stack to the ERIKA real-time operating system. This implementation was validated experimentally and its behaviour compared with the TinyOS–based implementation.Os últimos avanços nas tecnologias de informação e comunicação (ICTs) estão a abrir caminho para novos paradigmas de sistemas computacionais embebidos. Este facto, aliado à tendência crescente em monitorizar e controlar tudo, em qualquer lugar, está a alimentar o desenvolvimento de novas infra-estruturas de Redes de Sensores Sem Fios (WSNs), que irão interagir intimamente com o mundo físico de uma forma ubíqua. Este género de sistemas ciber-físicos de grande escala, requer uma reflexão sobre os conceitos de redes e de computação tradicionais, e tendo em conta a proximidade que estas entidades partilham com ambiente envolvente, o seu comportamento temporal é de acrescida importância. Esta Tese endereça a utilização de protocolos normalizados, em particular do IEEE 802.15.4 e ZigBee em conjunto com tecnologias comerciais, para desenvolver infraestruturas WSN capazes de responder aos requisitos de Qualidade de Serviço (QoS) (especialmente em termos de comportamento temporal e tempo de vida do sistema), que os futuros sistemas embebidos de grande escala deverão exigir. Com este propósito, nesta Tese começamos por analisar a performance do mecanismo de Slotted CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) do IEEE 802.15.4 para diferentes parâmetros, através de simulação e experimentalmente. De modo a melhorar a performance destas redes (ex. throughput, eficiência energética, atrasos) em cenários que contenham nós escondidos (hidden-nodes), foi implementado e validado experimentalmente um mecanismo para eliminar este problema. A eficácia deste mecanismo foi também demonstrada num cenário aplicacional real. Foi testada e validada uma metodologia para modelizar uma WSN em cluster-tree e calcular os piores atrasos das mensagens, necessidades de buffering e de largura de banda. Este trabalho foi de grande importância para compreender o comportamento deste tipo de redes para condições de utilização limite e para as configurar a priori. O nosso trabalho experimental permitiu identificar uma série de limitações tecnológicas, nomeadamente relacionadas com hardware/software e outras relacionadas com a implementação do Open-ZB em TinyOS. Isto desencadeou a migração da pilha protocolar IEEE 802.15.4/ZigBee Open-ZB para o ERIKA, um sistema operativo de tempo-real. Esta implementação foi validada experimentalmente e o seu comportamento comparado com o da implementação baseada em TinyOS

    Modeling and experimental performance analysis of ZigBee-IEEE 802.15.4 for wireless body area networks

    Get PDF
    Dissertação de mestrado integrado em Engenharia de ComunicaçõesThe emerging field of wireless body area networks (WBAN) has the potential to play an important role in everyday life, and there are many industries such as health, sports and entertainment that can take advantage of these networks. The wireless monitoring of users’ physical state, in indoor or outdoor environments, can bring benefits in several application scenarios; for example, it can increase patients’ general well-being and reduce caregivers’ workload by allowing continuous monitoring. This dissertation identifies and analyzes key performance aspects of using the ZigBee and IEEE 802.15.4 protocols in WBAN applications. The main reason behind this work is because these protocols were designed primarily for wireless sensor networks (WSNs) but are also being used in WBAN applications, particularly in the healthcare area. The differences between WSN and WBANs are explained and are used to discuss the usage of the ZigBee and the IEEE 802.15.4 standards in WBANs. The analysis performed in this work consists mainly in the execution of experimental tests with non-beacon enabled ZigBee/IEEE 802.15.4 networks, using widespread hardware and software platforms from Texas Instruments, regarding relevant quality of service (QoS) metrics (maximum throughput, delivery ratio and network delay), as well as the effects of multiple constraints, such as hidden nodes, clock drift and body interference in the network performance. A clock drift model was proposed to estimate when two nodes will interfere with each other. This model was conceived due to the lack of support from the ZigBee to overcome this issue. A solution to overcome the clock drift and the hidden node problems was then designed. A parametric software delay model of ZigBee network devices was also defined and introduced into a simulator so that more accurate simulation results could be obtained. The proposed models were deemed valid since they were thoroughly tested and the predicted results were obtained.As redes de sensores sem fios de área corporal (WBAN) têm o potencial de desempenhar um papel importante no dia-a-dia. Hoje em dia há muitas indústrias, tais como na área da saúde, do desporto e do entretenimento, que podem tirar proveito dessas redes. A monitorização sem fios de sinais fisiológicos, tanto em ambientes fechados como ao ar livre, pode trazer benefícios em vários cenários de aplicação, tais como, aumentar o bem-estar de pacientes que são monitorizados e reduzir a carga de trabalho de médicos, permitindo a monitorização contínua. Esta dissertação identifica e analisa aspetos chave do desempenho das redes ZigBee e IEEE 802.15.4, quando usadas em aplicações típicas das WBAN. A principal motivação para a realização deste trabalho reside no facto de que, apesar de terem sido projetados principalmente para redes de sensores sem fio (WSN), estes protocolos estão também a ser utilizados em aplicações características das WBAN, particularmente na área da saúde. As diferenças entre as WSN e as WBAN são destacadas e usadas para discutir o uso dos protocolos ZigBee e IEEE 802.15.4 nas WBAN. A análise realizada neste trabalho consiste, principalmente, na execução de testes experimentais de redes ZigBee/IEEE 802.15.4 a funcionar no modo non-beacon enabled, usando as plataformas de hardware e software da Texas Instruments. A análise leva em consideração métricas relevantes (o máximo goodput, a taxa de entrega e o atraso da rede) de qualidade de serviço (QoS) e os efeitos de várias condicionantes, como os nós escondidos, o clock drift e a interferência do corpo humano no desempenho da rede. Um modelo para o clock drift foi proposto para estimar quando dois dispositivos irão interferir um com o outro devido a este fenómeno. Este modelo foi concebido devido à falta de capacidade para o ZigBee superar este problema. Posteriormente foi concebida uma solução para ultrapassar os problemas associados ao clock drift e aos nós escondidos. Um modelo paramétrico de atrasos de software em dispositivos de redes ZigBee foi também definido e introduzido num simulador, de modo a que resultados de simulações mais precisos possam ser obtidos. Os modelos propostos foram considerados válidos dado que foram testados e os resultados previstos foram obtidos

    Exploração de Covert Channels de Rede sobre comunicações IEEE 802.15.4

    Get PDF
    The advancements in information and communication technology in the past decades have been converging into a new communication paradigm in which everything is expected to be interconnected with the heightened pervasiveness and ubiquity of the Internet of Things (IoT) paradigm. As these technologies mature, they are increasingly finding its way into more sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount. While the number of deployed IoT devices continues to increase annually, up to tens of billions of connected devices, IoT devices continue to present severe cyber-security vulnerabilities, which are worsened by challenges such as scalability, heterogeneity, and their often scarce computing capacity. Network covert channels are increasingly being used to support malware with stealthy behaviours, aiming at exfiltrating data or to orchestrate nodes of a botnet in a cloaked fashion. Nevertheless, the attention to this problem regarding underlying and pervasive IoT protocols such as the IEEE 802.15.4 has been scarce. Therefore, in this Thesis, we aim at analysing the performance and feasibility of such covertchannel implementations upon the IEEE 802.15.4 protocol to support the development of new mechanisms and add-ons that can effectively contribute to improve the current state of-art of IoT systems which rely on such, or similar underlying communication technologies.Os avanços nas tecnologias de informação e comunicação nas últimas décadas têm convergido num novo paradigma de comunicação, onde se espera que todos os intervenientes estejam interconectados pela ubiquidade do paradigma da Internet of Things (Internet das Coisas). Com a maturação destas tecnologias, elas têm-se vindo a infiltrar em domínios cada vez mais sensíveis, como nas aplicações médicas e industriais, onde a confiabilidade da informação e cyber-segurança são um fator crítico. Num contexto onde o número de dispositivos IoT continua a aumentar anualmente, já na ordem das dezenas de biliões de dispositivos interconectados, estes continuam, contudo, a apresentar severas vulnerabilidades no campo da cyber-segurança, sendo que os desafios como a escalabilidade, heterogeneidade e, na maioria das vezes, a sua baixa capacidade de processamento, tornam ainda mais complexa a sua resolução de forma permanente. Os covert channels de rede são cada vez mais um meio de suporte a malwares que apresentam comportamentos furtivos, almejando a extração de informação sensível ou a orquestração de nós de uma botnet de uma forma camuflada. Contudo, a atenção dada a este problema em protocolos de rede IoT abrangentes como o IEEE 802.15.4, tem sido escassa. Portanto, nesta tese, pretende-se elaborar uma análise da performance e da viabilidade da implementação de covert channels em modelos de rede onde figura o protocolo IEEE 802.15.4 de forma a suportar o desenvolvimento de novos mecanismos e complementos que podem efetivamente contribuir para melhorar a ciber-segurança de sistemas IoT que dependem do suporte destas tecnologias de comunicação

    Design of linear regression based localization algorithms for wireless sensor networks

    Get PDF

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper
    corecore