8 research outputs found

    Analysis of Jamming Attacks on Wireless Sensor Networks

    Get PDF
    Wireless Sensor Network (WSN) is a wireless-oriented form of communication largely used for outdoor applications, such as environmental monitoring and military surveillance. Therefore, a jamming attack is one of the denial of service attacks (DOS) that may take place by jamming the communication channel, making communication between genuine sensor nodes difficult or even impossible. Several studies have been carried out to develop countermeasures against jamming attacks, utilising parameters such as Packet Delivery Ratio (PDR), Packet Send Ratio (PSR), Received Signal Strength Indication (RSSI) and Clear Channel Assessment (CCA). The accuracy of the parameters used is very important for developing successful countermeasures against jamming attacks. Consequently, the focus in this study is to examine the effect of a jamming attack that was generated by one or more wireless sensor network nodes on PDR, PSR and RSSI, and look at the enhancements that can be made on Packet Delivery Ratio by altering the value of CCA on sender nodes. The experiment was performed using XBee RF and K-mote devices configured as jammers by disabling the CSMA protocol. It was performed in a non-isolated room in order to emulate a real-life environment. Two scenarios were carried out in this study. The first scenario aimed to study RSSI, PSR and PDR values with a fixed CCA value, and the second scenario studied the effect of CCA on PDR value. The experiment showed that the RSSI value measured by XBee RF inflated in the presence of noise. This fact has to be considered when RSSI is utilised in jamming attack counter measures. Further, it has been observed that the PDR value is distressed by jamming because genuine packets collide with jammers’ packets and increase the power of the sent packets without considering that the distance will not be enough to enhance the PDR value. This study demonstrates that changing the CCA threshold value on the XBee RF module influences the Packet Delivery Ratio (PDR) value in the presence of jamming

    Real-Time FPGA-Based Systems to Remote Monitoring

    Get PDF
    Some industrial and laboratory applications such as control, monitoring, test and measurements, and automation require real-time systems for their development. Embedded systems for acquisition and processing often require the participation of the embedded operating system and therefore are necessary techniques that can accelerate software execution. The latest field-programmable gate arrays’ (FPGA) technology has blurred the distinction between hardware and software with embedded processors that allow the development of Systems-on-a-Chip (SoC) running on operating systems. The widespread adoption of wireless technologies such as Bluetooth, ZigBee, and Wi-Fi in the last years has facilitated the use of these technologies to the development of real-time monitoring applications that combined with FPGA devices which has the advantages of low cost, flexibility, and scalability as compared with other commercial systems

    IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints

    No full text

    IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints

    No full text
    This book outlines the most important characteristics of IEEE 802.15.4 and ZigBee and how they can be used to engineer Wireless Sensor Network (WSN) systems and applications, with a particular focus on Quality-of-Service (QoS) aspects. It starts by providing a snapshot of the most relevant features of these two protocols, identifying some gaps in the standard specifications. Then it describes several state-of-the-art open-source implementations, models and tools that have been designed by the authors and have been widely used by the international community. The book also outlines the fundamental performance limits of IEEE 802.15.4/ZigBee networks, based on well-sustained analytical, simulation and experimental models, including how to dimension such networks to optimize delay/energy trade-offs

    Solutions and Tools for Secure Communication in Wireless Sensor Networks

    Get PDF
    Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of security material, and effective prevention and reaction against security threats and attacks. However, WSNs are mainly composed of resource-constrained devices. That is, network nodes feature reduced capabilities, especially in terms of memory storage, computing power, transmission rate, and energy availability. As a consequence, assuring secure communication in WSNs results to be more difficult than in other kinds of network. In fact, trading effectiveness of adopted solutions with their efficiency becomes far more important. In addition, specific device classes or technologies may require to design ad hoc security solutions. Also, it is necessary to efficiently manage security material, and dynamically cope with changes of security requirements. Finally, security threats and countermeasures have to be carefully considered since from the network design phase. This Ph.D. dissertion considers secure communication in WSNs, and provides the following contributions. First, we provide a performance evaluation of IEEE 802.15.4 security services. Then, we focus on the ZigBee technology and its security services, and propose possible solutions to some deficiencies and inefficiencies. Second, we present HISS, a highly scalable and efficient key management scheme, able to contrast collusion attacks while displaying a graceful degradation of performance. Third, we present STaR, a software component for WSNs that secures multiple traffic flows at the same time. It is transparent to the application, and provides runtime reconfigurability, thus coping with dynamic changes of security requirements. Finally, we describe ASF, our attack simulation framework for WSNs. Such a tool helps network designers to quantitatively evaluate effects of security attacks, produce an attack ranking based on their severity, and thus select the most appropriate countermeasures

    Field Programmable Gate Arrays (FPGAs) II

    Get PDF
    This Edited Volume Field Programmable Gate Arrays (FPGAs) II is a collection of reviewed and relevant research chapters, offering a comprehensive overview of recent developments in the field of Computer and Information Science. The book comprises single chapters authored by various researchers and edited by an expert active in the Computer and Information Science research area. All chapters are complete in itself but united under a common research study topic. This publication aims at providing a thorough overview of the latest research efforts by international authors on Computer and Information Science, and open new possible research paths for further novel developments
    corecore