3,738 research outputs found
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
Lifetime Improvement in Wireless Sensor Networks via Collaborative Beamforming and Cooperative Transmission
Collaborative beamforming (CB) and cooperative transmission (CT) have
recently emerged as communication techniques that can make effective use of
collaborative/cooperative nodes to create a virtual
multiple-input/multiple-output (MIMO) system. Extending the lifetime of
networks composed of battery-operated nodes is a key issue in the design and
operation of wireless sensor networks. This paper considers the effects on
network lifetime of allowing closely located nodes to use CB/CT to reduce the
load or even to avoid packet-forwarding requests to nodes that have critical
battery life. First, the effectiveness of CB/CT in improving the signal
strength at a faraway destination using energy in nearby nodes is studied.
Then, the performance improvement obtained by this technique is analyzed for a
special 2D disk case. Further, for general networks in which
information-generation rates are fixed, a new routing problem is formulated as
a linear programming problem, while for other general networks, the cost for
routing is dynamically adjusted according to the amount of energy remaining and
the effectiveness of CB/CT. From the analysis and the simulation results, it is
seen that the proposed method can reduce the payloads of energy-depleting nodes
by about 90% in the special case network considered and improve the lifetimes
of general networks by about 10%, compared with existing techniques.Comment: Invited paper to appear in the IEE Proceedings: Microwaves, Antennas
and Propagation, Special Issue on Antenna Systems and Propagation for Future
Wireless Communication
Orion Routing Protocol for Delay-Tolerant Networks
In this paper, we address the problem of efficient routing in delay tolerant
network. We propose a new routing protocol dubbed as ORION. In ORION, only a
single copy of a data packet is kept in the network and transmitted, contact by
contact, towards the destination. The aim of the ORION routing protocol is
twofold: on one hand, it enhances the delivery ratio in networks where an
end-to-end path does not necessarily exist, and on the other hand, it minimizes
the routing delay and the network overhead to achieve better performance. In
ORION, nodes are aware of their neighborhood by the mean of actual and
statistical estimation of new contacts. ORION makes use of autoregressive
moving average (ARMA) stochastic processes for best contact prediction and
geographical coordinates for optimal greedy data packet forwarding. Simulation
results have demonstrated that ORION outperforms other existing DTN routing
protocols such as PRoPHET in terms of end-to-end delay, packet delivery ratio,
hop count and first packet arrival
Electronically-switched Directional Antennas for Low-power Wireless Networks: A Prototype-driven Evaluation
We study the benefits of electronically-switched directional antennas in low-power wireless networks. This antenna technology may improve energy efficiency by increasing the communication range and by alleviating contention in directions other than the destination, but in principle requires a dedicated network stack. Unlike most existing works, we start by characterizing a real-world antenna prototype, and apply this to an existing low-power wireless stack, which we adapt with minimal changes. Our results show that: i) the combination of a low-cost directional antenna and a conventional network stack already brings significant performance improvements, e.g., nearly halving the radio-on time per delivered packet; ii) the margin of improvement available to alternative clean-slate protocol designs is similarly large and concentrated in the control rather than the data plane; iii) by artificially modifying our antenna's link-layer model, we can point at further potential benefits opened by different antenna designs
A novel cooperative opportunistic routing scheme for underwater sensor networks
Increasing attention has recently been devoted to underwater sensor networks (UWSNs) because of their capabilities in the ocean monitoring and resource discovery. UWSNs are faced with different challenges, the most notable of which is perhaps how to efficiently deliver packets taking into account all of the constraints of the available acoustic communication channel. The opportunistic routing provides a reliable solution with the aid of intermediate nodes’ collaboration to relay a packet toward the destination. In this paper, we propose a new routing protocol, called opportunistic void avoidance routing (OVAR), to address the void problem and also the energy-reliability trade-off in the forwarding set selection. OVAR takes advantage of distributed beaconing, constructs the adjacency graph at each hop and selects a forwarding set that holds the best trade-off between reliability and energy efficiency. The unique features of OVAR in selecting the candidate nodes in the vicinity of each other leads to the resolution of the hidden node problem. OVAR is also able to select the forwarding set in any direction from the sender, which increases its flexibility to bypass any kind of void area with the minimum deviation from the optimal path. The results of our extensive simulation study show that OVAR outperforms other protocols in terms of the packet delivery ratio, energy consumption, end-to-end delay, hop count and traversed distance
Let the Tree Bloom: Scalable Opportunistic Routing with ORPL
Routing in battery-operated wireless networks is challenging, posing a tradeoff between energy and latency. Previous work has shown that opportunistic routing can achieve low-latency data collection in duty-cycled networks. However, applications are now considered where nodes are not only periodic data sources, but rather addressable end points generating traffic with arbitrary patterns.
We present ORPL, an opportunistic routing protocol that supports any-to-any, on-demand traffic. ORPL builds upon RPL, the standard protocol for low-power IPv6 networks. By combining RPL's tree-like topology with opportunistic routing, ORPL forwards data to any destination based on the mere knowledge of the nodes' sub-tree. We use bitmaps and Bloom filters to represent and propagate this information in a space-efficient way, making ORPL scale to large networks of addressable nodes. Our results in a 135-node testbed show that ORPL outperforms a number of state-of-the-art solutions including RPL and CTP, conciliating a sub-second latency and a sub-percent duty cycle. ORPL also increases robustness and scalability, addressing the whole network reliably through a 64-byte Bloom filter, where RPL needs kilobytes of routing tables for the same task
- …