20,217 research outputs found

    Security Challenges and Efficient Security Solutions for Ad-Hoc Wireless Sensor Network

    Get PDF
    Wireless sensor networks sense the information, process them locally and communicate it to the outside world via satellite or Internet. Wireless Sensor Networks (WSNs) use tiny, inexpensive sensor nodes with several distinguishing characteristics: they have very low processing power and radio ranges, permit very low energy consumption and perform limited and specific monitoring and sensing functions. Wireless sensor networks (WSN) are widely used for applications such as environment monitoring, habitat monitoring, forest fire control, border surveillance and health monitoring due to their capability of establishing communications among peer nodes in a self-organizing and adapting manner, without any infrastructure. Sensor networks use radio frequencies as a communication medium, which is vulnerable of all active and passive attacks from adversaries. The sensor net-work must be protected to avoid attacks from external parties. This protection is provided by the security primitives. This paper mainly concerns with problems associated in developing security protocols for wireless sensor networks, their requirements, and different types of attacks on sensor networks. This paper describes secure solutions for collecting and processing data in Wireless Sensor Networks (WSNs). Adequate security capabilities for medium and large scale WSNs are a hard but necessary goal to achieve to prepare these networks for the market. The paper also includes security and reliability challenges and also security solution for WSNs

    A General Purpose Framework for Wireless Sensor Network Applications

    Get PDF
    Wireless sensor networks are becoming a basis for a rapidly increasing range of applications. Habitat, flood, and wildfire monitoring are interesting examples of such applications. Each application has different requirements in terms of node functionalities, network size, complexity and cost; therefore, it is worthwhile time investment to design and implement a general purpose framework for wireless sensor networks that would be adaptable to any monitoring application of interest with a minimum amount of effort. In this manuscript, we propose a basic structure for such a framework and highlight a number of challenges anticipated during the course of this doctoral research

    Lease based addressing for event-driven wireless sensor networks

    Full text link
    Sensor Networks have applications in diverse fields. They can be deployed for habitat modeling, temperature monitoring and industrial sensing. They also find applications in battlefield awareness and emergency (first) response situations. While unique addressing is not a requirement of many data collecting applications of wireless sensor networks it is vital for the success of applications such as emergency response. Data that cannot be associated with a specific node becomes useless in such situations. In this work we propose an addressing mechanism for event-driven wireless sensor networks. The proposed scheme eliminates the need for network wide Duplicate Address Detection (DAD) and enables reuse of addresses. <br /

    Black Hole Attack detection in Zone based Wireless Sensor Networks

    Get PDF
    The Wireless Sensor Networks (WSNs) became an emerging promising technology deployed in an area for specific purpose and in the wide range of application area such as military application, control and tracking application, habitat monitoring, industry, medicine, health care, agriculture etc. Wireless sensor networks are prone to various attacks. One such type of attack is a black hole attack. A black hole attack is a type of denial of service attack where the node drops the packets fully or selectively, routed through this node which discards the sensitive data packets. This paper deals with the detection of black hole attack inzone basedwireless sensor network using the mobile agents

    Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) protocol

    Get PDF
    Sensor network consists of tiny sensors and actuators with general purpose computing elements to cooperatively monitor physical or environmental conditions, such as temperature, pressure, etc. Wireless Sensor Networks are uniquely characterized by properties like limited power they can harvest or store, dynamic network topology, large scale of deployment. Sensor networks have a huge application in fields which includes habitat monitoring, object tracking, fire detection, land slide detection and traffic monitoring. Based on the network topology, routing protocols in sensor networks can be classified as flat-based routing, hierarchical-based routing and location-based routing. These protocols are quite simple and hence are very susceptible to attacks like Sinkhole attack, Selective forwarding, Sybil attack, Wormholes, HELLO flood attack, Acknowledgement spoofing or altering, replaying routing information. Low Energy Adaptive Clustering Hierarchy (LEACH) is an energy-efficient hierarchical-based routing protocol. Our prime focus was on the analysis of LEACH based upon certain parameters like network lifetime, stability period, etc. and also the effect of selective forwarding attack and degree of heterogeneity on LEACH protocol. After a number of simulations, it was found that the stability region’s length is considerably increased by choosing an optimal value of heterogeneity; energy is not properly utilized and throughput is decreased in networks compromised by selective forwarding attack but the number of cluster-heads per round remains unaffected in such networks

    An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP)

    Get PDF
    open access articleWireless Sensor Network is a network of large number of nodes with limited power and computational capabilities. It has the potential of event monitoring in unattended locations where there is a chance of unauthorized access. The work that is presented here identifies and addresses the problem of eavesdropping in the exposed environment of the sensor network, which makes it easy for the adversary to trace the packets to find the originator source node, hence compromising the contextual privacy. Our scheme provides an enhanced three-level security system for source location privacy. The base station is at the center of square grid of four quadrants and it is surrounded by a ring of flooding nodes, which act as a first step in confusing the adversary. The fake node is deployed in the opposite quadrant of actual source and start reporting base station. The selection of phantom node using our algorithm in another quadrant provides the third level of confusion. The results show that Dissemination in Wireless Sensor Networks (DeLP) has reduced the energy utilization by 50% percent, increased the safety period by 26%, while providing a six times more packet delivery ratio along with a further 15% decrease in the packet delivery delay as compared to the tree-based scheme. It also provides 334% more safety period than the phantom routing, while it lags behind in other parameters due to the simplicity of phantom scheme. This work illustrates the privacy protection of the source node and the designed procedure may be useful in designing more robust algorithms for location privac
    corecore