507 research outputs found
Key Management Techniques for Wireless Mesh Network
Key management is one of the most important tasks in wireless mesh network. This service is responsible for key generation, distribution, and key exchange in a cryptography-based system. Due to the shared nature of WMNs and absence of globally trusted central authority, key management becomes more challenging. This chapter introduces several key management methods that can address these challenges. The fundamental approach is the secret sharing scheme created by A. Shamir, which effectively distributes keys to all participantsâ network. Based on Shamirâs scheme, many authors proposed other algorithms to secure the communication channel in such a way that adversary cannot steal any information about the secret. In addition, in this chapter, a new secret sharing method using real-time synchronization among transceiver devices is presented. In this method, each node generates its key depending on its physical information and the real-time clock. Therefore, public and private keys can be managed efficiently for data encryption and prevent several external attacks to WMNs. A specific protocol is proposed to secure keys while transferring between devices to prevent internal attacks
Real-time Key Management for Wireless Mesh Network
With the rapid technological development of wireless, wireless mesh network (WMN) is one of the network models which is gradually showing its superiority through several applications and projects thus it is becoming the key of technology for IoT. Due to the vulnerable environment, limited resource and open communication channel, the security design for such networks are significantly challenging. By using realtime synchronization method between transceiver devices in the WMNs, we propose an algorithm based on secret sharing method in which each node generate its key depend on its physical information and the real-time clock. Therefore, we can manage efficiently public and private keys for data encryption and prevent several external attacks to WMNs. We also propose a specific protocol to secure our keys while transferring between devices to prevent internal attacks
A Survey of Cryptography and Key Management Schemes for Wireless Sensor Networks
Wireless sensor networks (WSNs) are made up of a large number of tiny sensors, which can sense, analyze, and communicate information about the outside world. These networks play a significant role in a broad range of fields, from crucial military surveillance applications to monitoring building security. Key management in WSNs is a critical task. While the security and integrity of messages communicated through these networks and the authenticity of the nodes are dependent on the robustness of the key management schemes, designing an efficient key generation, distribution, and revocation scheme is quite challenging. While resource-constrained sensor nodes should not be exposed to computationally demanding asymmetric key algorithms, the use of symmetric key-based systems leaves the entire network vulnerable to several attacks. This chapter provides a comprehensive survey of several well-known cryptographic mechanisms and key management schemes for WSNs
Location dependent key management schemes supported by random selected cell reporters in wireless sensor networks
PhD ThesisIn order to secure vital and critical information inside Wireless Sensor Net-
works (WSNs), a security requirement of data con dentiality, authenticity
and availability should be guaranteed. The leading key management schemes
are those that employ location information to generate security credentials.
Therefore, this thesis proposes three novel location-dependent key manage-
ment schemes.
First, a novel Location-Dependent Key Management Protocol for a Single
Base Station (LKMP-SBS) is presented. As a location-dependent scheme, the
WSN zone is divided virtually into cells. Then, any event report generated
by each particular cell is signed by a new type of endorsement called a cell-
reporter signature, where cell-reporters are de ned as a set of nodes selected
randomly by the BS out of the nodes located within the particular cell. This
system is analysed and proved to outperform other schemes in terms of data
security requirements. Regarding the data con dentiality, for three values of
z (1,2,3) the improvement is 95%, 90% and 85% respectively when 1000 nodes
are compromised. Furthermore, in terms of data authenticity an enhancement
of 49%, 24%, 12.5% is gained using our approach with z = 1; 2; 3 respectively
when half of all nodes are compromised. Finally, the optimum number of cell
reporters is extensively investigated related to the security requirements, it is
proven to be z =
n
2
.
The second contribution is the design of a novel Location-Dependent Key Man-
agement Protocol for Multiple Base Stations (LKMP-MBS). In this scheme,
di erent strategies of handling the WSN by multiple BSs is investigated. Ac-
cordingly, the optimality of the scheme is analysed in terms of the number of
cell reporters. Both data con dentiality and authenticity have been proven to
be / e / 1
N . The optimum number of cell reporters had been calculated as
zopt = n
2M ,
PM
`=1 jz(`)
optj =
n
2M
. Moreover, the security robustness of this scheme
is analysed and proved to outperform relevant schemes in terms of data con-
dentiality and authenticity. Furthermore, in comparison with LKMP-SBS,
the adoption of multiple base stations is shown to be signi cantly important
in improving the overall system security.
The third contribution is the design of the novel Mobility- Enabled, Location-
dependant Key Managment Protocol for Multiple BSs (MELKMP-MBS). This
scheme presents a key management scheme, which is capable of serving a WSN
with mobile nodes. Several types of handover are presented in order to main-
tain the mobile node service availability during its movement between two
zones in the network. Accordingly, the communication overhead of MELKMP-
MBS is analysed, simulated and compared with the overhead of other schemes.
Results show a signi cant improvement over other schemes in terms of han-
dover e ciency and communication over head. Furthermore, the optimality
of WSN design such as the value of N; n is investigated in terms of communi-
cation overhead in all protocols and it is shown that the optimum number of
nodes in each cell, which cause the minimum communication overhead in the
network , is n = 3
p
2N.Ministry of Higher Education
and Scienti c Research in Iraq and the Iraqi Cultural Attach e in Londo
Engineering Self-Adaptive Collective Processes for Cyber-Physical Ecosystems
The pervasiveness of computing and networking is creating significant opportunities for building valuable socio-technical systems. However, the scale, density, heterogeneity, interdependence, and QoS constraints of many target systems pose severe operational and engineering challenges. Beyond individual smart devices, cyber-physical collectives can provide services or solve complex problems by leveraging a âsystem effectâ while coordinating and adapting to context or environment change. Understanding and building systems exhibiting collective intelligence and autonomic capabilities represent a prominent research goal, partly covered, e.g., by the field of collective adaptive systems. Therefore, drawing inspiration from and building on the long-time research activity on coordination, multi-agent systems, autonomic/self-* systems, spatial computing, and especially on the recent aggregate computing paradigm, this thesis investigates concepts, methods, and tools for the engineering of possibly large-scale, heterogeneous ensembles of situated components that should be able to operate, adapt and self-organise in a decentralised fashion. The primary contribution of this thesis consists of four main parts. First, we define and implement an aggregate programming language (ScaFi), internal to the mainstream Scala programming language, for describing collective adaptive behaviour, based on field calculi. Second, we conceive of a âdynamic collective computationâ abstraction, also called aggregate process, formalised by an extension to the field calculus, and implemented in ScaFi. Third, we characterise and provide a proof-of-concept implementation of a middleware for aggregate computing that enables the development of aggregate systems according to multiple architectural styles. Fourth, we apply and evaluate aggregate computing techniques to edge computing scenarios, and characterise a design pattern, called Self-organising Coordination Regions (SCR), that supports adjustable, decentralised decision-making and activity in dynamic environments.Con lo sviluppo di informatica e intelligenza artificiale, la diffusione pervasiva di device computazionali e la crescente interconnessione tra elementi fisici e digitali, emergono innumerevoli opportunitĂ per la costruzione di sistemi socio-tecnici di nuova generazione. Tuttavia, l'ingegneria di tali sistemi presenta notevoli sfide, data la loro complessitĂ âsi pensi ai livelli, scale, eterogeneitĂ , e interdipendenze coinvolti. Oltre a dispositivi smart individuali, collettivi cyber-fisici possono fornire servizi o risolvere problemi complessi con un âeffetto sistemaâ che emerge dalla coordinazione e l'adattamento di componenti fra loro, l'ambiente e il contesto. Comprendere e costruire sistemi in grado di esibire intelligenza collettiva e capacitĂ autonomiche è un importante problema di ricerca studiato, ad esempio, nel campo dei sistemi collettivi adattativi. Perciò, traendo ispirazione e partendo dall'attivitĂ di ricerca su coordinazione, sistemi multiagente e self-*, modelli di computazione spazio-temporali e, specialmente, sul recente paradigma di programmazione aggregata, questa tesi tratta concetti, metodi, e strumenti per l'ingegneria di
ensemble di elementi situati eterogenei che devono essere in grado di lavorare, adattarsi, e auto-organizzarsi in modo decentralizzato. Il contributo di questa tesi consiste in quattro parti principali. In primo luogo, viene definito e implementato un linguaggio di programmazione aggregata (ScaFi), interno al linguaggio Scala, per descrivere comportamenti collettivi e adattativi secondo l'approccio dei campi computazionali. In secondo luogo, si propone e caratterizza l'astrazione di processo aggregato per rappresentare computazioni collettive dinamiche concorrenti, formalizzata come estensione al field calculus e implementata in ScaFi. Inoltre, si analizza e implementa un prototipo di middleware per sistemi aggregati, in grado di supportare piĂš stili architetturali. Infine, si applicano e valutano tecniche di programmazione aggregata in scenari di edge computing, e si propone un pattern, Self-Organising Coordination Regions, per supportare, in modo decentralizzato, attivitĂ decisionali e di regolazione in ambienti dinamici
On-demand service architecture for wireless vehicular networks
Vehicular Networks (VN) or VANETS has become a cutting-edge topic in the development of innovative solutions for the automotive industry and of special interest to transit management authorities. Well known examples of the potential benefits of enabling communications in vehicles is fostering a better driving by reducing the risk of accidents on the road. Besides the transmission of safety messages among vehicles in the vicinity, the development of non-safety applications will allow the delivery of information services to potential users willing to request them in on-demand basis. To provide such type of services, major challenges need to be tackled to offer secure and reliable communication in anonymous and sometimes hostile communication environments on the roads. These challenges cover security, billing and accounting issues to provide a secure access to services. The objective of this thesis work is to propose a service architecture for on-demand services in vehicular environments. A key point to keep a robust information service supply, stands in the capacity to provide and manage security mechanisms which comprise authentication and authorization of subscribers following a temporary subscription model. These features, along with privacy mechanisms, will offer to the communicating peers a secure way to mutually access and exchange information even if no previous knowledge of each other is available. Policies of service providers can regulate the supply of information services according to the subscribers' profiles. Providers can also define the implementation of accountability models in the form of metering and billing schemes appropriate for VANETS. This will result in the implementation of incentive and collaborative mechanisms to foster service delivery among vehicles
A COGNITIVE ARCHITECTURE FOR AMBIENT INTELLIGENCE
LâAmbient Intelligence (AmI) è caratterizzata dallâuso di sistemi pervasivi per
monitorare lâambiente e modificarlo secondo le esigenze degli utenti e rispettando
vincoli definiti globalmente. Questi sistemi non possono prescindere da requisiti
come la scalabilitĂ e la trasparenza per lâutente. Una tecnologia che consente di
raggiungere questi obiettivi è rappresentata dalle reti di sensori wireless (WSN),
caratterizzate da bassi costi e bassa intrusivitĂ . Tuttavia, sebbene in grado di
effettuare elaborazioni a bordo dei singoli nodi, le WSN non hanno da sole le capacitĂ
di elaborazione necessarie a supportare un sistema intelligente; dâaltra parte
senza questa attività di pre-elaborazione la mole di dati sensoriali può facilmente
sopraffare un sistema centralizzato con unâeccessiva quantitĂ di dettagli superflui.
Questo lavoro presenta unâarchitettura cognitiva in grado di percepire e controllare
lâambiente di cui fa parte, basata su un nuovo approccio per lâestrazione
di conoscenza a partire dai dati grezzi, attraverso livelli crescenti di astrazione.
Le WSN sono utilizzate come strumento sensoriale pervasivo, le cui capacitĂ computazionali
vengono utilizzate per pre-elaborare i dati rilevati, in modo da consentire
ad un sistema centralizzato intelligente di effettuare ragionamenti di alto
livello.
Lâarchitettura proposta è stata utilizzata per sviluppare un testbed dotato degli
strumenti hardware e software necessari allo sviluppo e alla gestione di applicazioni
di AmI basate su WSN, il cui obiettivo principale sia il risparmio energetico. Per
fare in modo che le applicazioni di AmI siano in grado di comunicare con il mondo
esterno in maniera affidabile, per richiedere servizi ad agenti esterni, lâarchitettura
è stata arricchita con un protocollo di gestione distribuita della reputazione.
Ă stata inoltre sviluppata unâapplicazione di esempio che sfrutta le caratteristiche
del testbed, con lâobiettivo di controllare la temperatura in un ambiente
lavorativo. Questâapplicazione rileva la presenza dellâutente attraverso un modulo
per la fusione di dati multi-sensoriali basato su reti bayesiane, e sfrutta questa
informazione in un controllore fuzzy multi-obiettivo che controlla gli attuatori sulla
base delle preferenze dellâutente e del risparmio energetico.Ambient Intelligence (AmI) systems are characterized by the use of pervasive
equipments for monitoring and modifying the environment according to usersâ
needs, and to globally defined constraints. Furthermore, such systems cannot ignore
requirements about ubiquity, scalability, and transparency to the user. An
enabling technology capable of accomplishing these goals is represented by Wireless
Sensor Networks (WSNs), characterized by low-costs and unintrusiveness. However,
although provided of in-network processing capabilities, WSNs do not exhibit
processing features able to support comprehensive intelligent systems; on the other
hand, without this pre-processing activities the wealth of sensory data may easily
overwhelm a centralized AmI system, clogging it with superfluous details.
This work proposes a cognitive architecture able to perceive, decide upon, and
control the environment of which the system is part, based on a new approach to
knowledge extraction from raw data, that addresses this issue at different abstraction
levels. WSNs are used as the pervasive sensory tool, and their computational
capabilities are exploited to remotely perform preliminary data processing. A central
intelligent unit subsequently extracts higher-level concepts in order to carry on
symbolic reasoning. The aim of the reasoning is to plan a sequence of actions that
will lead the environment to a state as close as possible to the usersâ desires, taking
into account both implicit and explicit feedbacks from the users, while considering
global system-driven goals, such as energy saving. The proposed conceptual architecture
was exploited to develop a testbed providing the hardware and software
tools for the development and management of AmI applications based on WSNs,
whose main goal is energy saving for global sustainability. In order to make the
AmI system able to communicate with the external world in a reliable way, when
some services are required to external agents, the architecture was enriched with
a distributed reputation management protocol.
A sample application exploiting the testbed features was implemented for addressing
temperature control in a work environment. Knowledge about the userâs
presence is obtained through a multi-sensor data fusion module based on Bayesian
networks, and this information is exploited by a multi-objective fuzzy controller
that operates on actuators taking into account usersâ preference and energy consumption
constraints
New Waves of IoT Technologies Research â Transcending Intelligence and Senses at the Edge to Create Multi Experience Environments
The next wave of Internet of Things (IoT) and Industrial Internet of Things (IIoT) brings new technological developments that incorporate radical advances in Artificial Intelligence (AI), edge computing processing, new sensing capabilities, more security protection and autonomous functions accelerating progress towards the ability for IoT systems to self-develop, self-maintain and self-optimise. The emergence of hyper autonomous IoT applications with enhanced sensing, distributed intelligence, edge processing and connectivity, combined with human augmentation, has the potential to power the transformation and optimisation of industrial sectors and to change the innovation landscape. This chapter is reviewing the most recent advances in the next wave of the IoT by looking not only at the technology enabling the IoT but also at the platforms and smart data aspects that will bring intelligence, sustainability, dependability, autonomy, and will support human-centric solutions.acceptedVersio
Efficient Passive Clustering and Gateways selection MANETs
Passive clustering does not employ control packets to collect topological information in ad hoc networks. In our proposal, we avoid making frequent changes in cluster architecture due to repeated election and re-election of cluster heads and gateways. Our primary objective has been to make Passive Clustering more practical by employing optimal number of gateways and reduce the number of rebroadcast packets
- âŚ