1,019 research outputs found
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Performance Assessment of Routing Protocols for IoT/6LoWPAN Networks
The Internet of Things (IoT) proposes a disruptive communication paradigm that allows
smart objects to exchange data among themselves to reach a common goal. IoT application
scenarios are multiple and can range from a simple smart home lighting system to fully controlled
automated manufacturing chains. In the majority of IoT deployments, things are equipped with
small devices that can suffer from severe hardware and energy restrictions that are responsible
for performing data processing and wireless communication tasks. Thus, due to their features,
communication networks that are used by these devices are generally categorized as Low Power
and Lossy Networks (LLNs).
The considerable variation in IoT applications represents a critical issue to LLN networks,
which should offer support to different requirements as well as keeping reasonable
quality-of-service (QoS) levels. Based on this challenge, routing protocols represent a key issue
in IoT scenarios deployment. Routing protocols are responsible for creating paths among devices
and their interactions. Hence, network performance and features are highly dependent
on protocol behavior. Also, based on the adopted protocol, the support for some specific requirements
of IoT applications may or may not be provided. Thus, a routing protocol should be
projected to attend the needs of the applications considering the limitations of the device that
will execute them.
Looking to attend the demand of routing protocols for LLNs and, consequently, for IoT
networks, the Internet Engineering Task Force (IETF) has designed and standardized the IPv6
Routing Protocol for Low Power and Lossy Networks (RPL). This protocol, although being robust
and offering features to fulfill the need of several applications, still presents several faults and
weaknesses (mainly related to its high complexity and memory requirement), which limits its
adoption in IoT scenarios. An alternative to RPL, the Lightweight On-demand Ad Hoc Distancevector
Routing Protocol – Next Generation (LOADng) has emerged as a less complicated routing
solution for LLNs. However, the cost of its simplicity is paid for with the absence of adequate
support for a critical set of features required for many IoT environments. Thus, based on the
challenging open issues related to routing in IoT networks, this thesis aims to study and propose
contributions to better attend the network requirements of IoT scenarios. A comprehensive survey,
reviewing state-of-the-art routing protocols adopted for IoT, identified the strengths and
weaknesses of current solutions available in the literature. Based on the identified limitations,
a set of improvements is designed to overcome these issues and enhance IoT network performance.
The novel solutions are proposed to include reliable and efficient support to attend
the needs of IoT applications, such as mobility, heterogeneity, and different traffic patterns.
Moreover, mechanisms to improve the network performance in IoT scenarios, which integrate
devices with different communication technologies, are introduced.
The studies conducted to assess the performance of the proposed solutions showed
the high potential of the proposed solutions. When the approaches presented in this thesis
were compared with others available in the literature, they presented very promising results
considering the metrics related to the Quality of Service (QoS), network and energy efficiency,
and memory usage as well as adding new features to the base protocols. Hence, it is believed
that the proposed improvements contribute to the state-of-the-art of routing solutions for IoT
networks, increasing the performance and adoption of enhanced protocols.A Internet das Coisas, do inglês Internet of Things (IoT), propõe um paradigma de
comunicação disruptivo para possibilitar que dispositivos, que podem ser dotados de comportamentos
autónomos ou inteligentes, troquem dados entre eles buscando alcançar um objetivo
comum. Os cenários de aplicação do IoT são muito variados e podem abranger desde um simples
sistema de iluminação para casa até o controle total de uma linha de produção industrial. Na
maioria das instalações IoT, as “coisas” são equipadas com um pequeno dispositivo, responsável
por realizar as tarefas de comunicação e processamento de dados, que pode sofrer com severas
restrições de hardware e energia. Assim, devido às suas características, a rede de comunicação
criada por esses dispositivos é geralmente categorizada como uma Low Power and Lossy Network
(LLN).
A grande variedade de cenários IoT representam uma questão crucial para as LLNs,
que devem oferecer suporte aos diferentes requisitos das aplicações, além de manter níveis
de qualidade de serviço, do inglês Quality of Service (QoS), adequados. Baseado neste desafio,
os protocolos de encaminhamento constituem um aspecto chave na implementação de
cenários IoT. Os protocolos de encaminhamento são responsáveis por criar os caminhos entre
os dispositivos e permitir suas interações. Assim, o desempenho e as características da rede
são altamente dependentes do comportamento destes protocolos. Adicionalmente, com base
no protocolo adotado, o suporte a alguns requisitos específicos das aplicações de IoT podem
ou não ser fornecidos. Portanto, estes protocolos devem ser projetados para atender as necessidades
das aplicações assim como considerando as limitações do hardware no qual serão
executados.
Procurando atender às necessidades dos protocolos de encaminhamento em LLNs e,
consequentemente, das redes IoT, a Internet Engineering Task Force (IETF) desenvolveu e padronizou
o IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). O protocolo, embora
seja robusto e ofereça recursos para atender às necessidades de diferentes aplicações, apresenta
algumas falhas e fraquezas (principalmente relacionadas com a sua alta complexidade e
necessidade de memória) que limitam sua adoção em cenários IoT. Em alternativa ao RPL, o
Lightweight On-demand Ad hoc Distance-vector Routing Protocol – Next Generation (LOADng)
emergiu como uma solução de encaminhamento menos complexa para as LLNs. Contudo, o
preço da simplicidade é pago com a falta de suporte adequado para um conjunto de recursos
essenciais necessários em muitos ambientes IoT. Assim, inspirado pelas desafiadoras questões
ainda em aberto relacionadas com o encaminhamento em redes IoT, esta tese tem como objetivo
estudar e propor contribuições para melhor atender os requisitos de rede em cenários IoT.
Uma profunda e abrangente revisão do estado da arte sobre os protocolos de encaminhamento
adotados em IoT identificou os pontos fortes e limitações das soluções atuais. Com base nas debilidades
encontradas, um conjunto de soluções de melhoria é proposto para superar carências
existentes e melhorar o desempenho das redes IoT. As novas soluções são propostas para incluir
um suporte confiável e eficiente capaz atender às necessidades das aplicações IoT relacionadas
com suporte à mobilidade, heterogeneidade dos dispositivos e diferentes padrões de tráfego.
Além disso, são introduzidos mecanismos para melhorar o desempenho da rede em cenários IoT
que integram dispositivos com diferentes tecnologias de comunicação.
Os vários estudos realizados para mensurar o desempenho das soluções propostas mostraram
o grande potencial do conjunto de melhorias introduzidas. Quando comparadas com
outras abordagens existentes na literatura, as soluções propostas nesta tese demonstraram um aumento do desempenho consistente para métricas relacionadas a qualidade de serviço, uso de
memória, eficiência energética e de rede, além de adicionar novas funcionalidades aos protocolos
base. Portanto, acredita-se que as melhorias propostas contribuiem para o avanço do estado
da arte em soluções de encaminhamento para redes IoT e aumentar a adoção e utilização dos
protocolos estudados
Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges
A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks has been considered an important field of research over the past decade. Nowadays, multipath routing approach is widely used in wireless sensor networks to improve network performance through efficient utilization of available network resources. Accordingly, the main aim of this survey is to present the concept of the multipath routing approach and its fundamental challenges, as well as the basic motivations for utilizing this technique in wireless sensor networks. In addition, we present a comprehensive taxonomy on the existing multipath routing protocols, which are especially designed for wireless sensor networks. We highlight the primary motivation behind the development of each protocol category and explain the operation of different protocols in detail, with emphasis on their advantages and disadvantages. Furthermore, this paper compares and summarizes the state-of-the-art multipath routing techniques from the network application point of view. Finally, we identify open issues for further research in the development of multipath routing protocols for wireless sensor networks
Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
Wireless sensor networks monitor dynamic environments that change rapidly
over time. This dynamic behavior is either caused by external factors or
initiated by the system designers themselves. To adapt to such conditions,
sensor networks often adopt machine learning techniques to eliminate the need
for unnecessary redesign. Machine learning also inspires many practical
solutions that maximize resource utilization and prolong the lifespan of the
network. In this paper, we present an extensive literature review over the
period 2002-2013 of machine learning methods that were used to address common
issues in wireless sensor networks (WSNs). The advantages and disadvantages of
each proposed algorithm are evaluated against the corresponding problem. We
also provide a comparative guide to aid WSN designers in developing suitable
machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial
A Survey on Routing Protocols for Large-Scale Wireless Sensor Networks
With the advances in micro-electronics, wireless sensor devices have been made much smaller and more integrated, and large-scale wireless sensor networks (WSNs) based the cooperation among the significant amount of nodes have become a hot topic. “Large-scale” means mainly large area or high density of a network. Accordingly the routing protocols must scale well to the network scope extension and node density increases. A sensor node is normally energy-limited and cannot be recharged, and thus its energy consumption has a quite significant effect on the scalability of the protocol. To the best of our knowledge, currently the mainstream methods to solve the energy problem in large-scale WSNs are the hierarchical routing protocols. In a hierarchical routing protocol, all the nodes are divided into several groups with different assignment levels. The nodes within the high level are responsible for data aggregation and management work, and the low level nodes for sensing their surroundings and collecting information. The hierarchical routing protocols are proved to be more energy-efficient than flat ones in which all the nodes play the same role, especially in terms of the data aggregation and the flooding of the control packets. With focus on the hierarchical structure, in this paper we provide an insight into routing protocols designed specifically for large-scale WSNs. According to the different objectives, the protocols are generally classified based on different criteria such as control overhead reduction, energy consumption mitigation and energy balance. In order to gain a comprehensive understanding of each protocol, we highlight their innovative ideas, describe the underlying principles in detail and analyze their advantages and disadvantages. Moreover a comparison of each routing protocol is conducted to demonstrate the differences between the protocols in terms of message complexity, memory requirements, localization, data aggregation, clustering manner and other metrics. Finally some open issues in routing protocol design in large-scale wireless sensor networks and conclusions are proposed
Enhanced collision avoidance mechanisms for wireless sensor networks through high accuracy collision modeling
Wireless channel and multi-hop communications cause a significant number of packet collisions in Wireless Sensor Networks (WSNs). Although a collision may cause packet loss and reduce network performance, low-power wireless transceivers allow packet reception in the presence of collisions if at least one signal can provide a sufficiently high power compared with other signals. Therefore, with respect to the large number of nodes used in WSNs, which necessitates the use of simulation for protocol development, collisions should be addressed at two layers: First, collisions should be modeled at the physical layer through a high-accuracy packet reception algorithm that decides about packet reception in the presence of collisions. Second, collision avoidance mechanisms should be employed at the Medium Access Control (MAC) layer to reduce packet losses caused by collisions. Unfortunately, the existing packet reception algorithms exhibit low accuracy and impede the development of efficient collision avoidance mechanisms. From the collision avoidance perspective, existing contention-based MAC protocols do not provide reliable packet broadcasting, thereby affecting the initialization performance of WSNs. In addition, despite the benefits of schedule-based MAC protocols during the data-gathering phase, the existing mechanisms rely on unrealistic assumptions. The first major contribution of this work is CApture Modeling Algorithm (CAMA), which enables collision modeling with high accuracy and efficiency at the physical layer. The higher accuracy of CAMA against existing approaches is validated through extensive comparisons with empirical experiments. The second major contribution includes mechanisms that improve the reliability of packet broadcasting. In particular, adaptive contention window adjustment mechanisms and the Geowindow algorithm are proposed for collision avoidance during the initialization phases. These mechanisms considerably improve the accuracy of the initialization phases, without violating duration and energy efficiency requirements. As the third major contribution, a distributed and concurrent link-scheduling algorithm (called DICSA) is proposed for collision avoidance during the data-gathering phase. DICSA provides faster slot assignment, higher spatial reuse and lower energy consumption, compared with existing algorithms. Furthermore, evaluating DICSA within a MAC protocol confirms its higher throughput, higher delivery ratio, and lower end-to-end delay
A Survey of System Architecture Requirements for Health Care-Based Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs) that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera). However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera) to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC) protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted
Robotic Wireless Sensor Networks
In this chapter, we present a literature survey of an emerging, cutting-edge,
and multi-disciplinary field of research at the intersection of Robotics and
Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor
Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system
that aims to achieve certain sensing goals while meeting and maintaining
certain communication performance requirements, through cooperative control,
learning and adaptation. While both of the component areas, i.e., Robotics and
WSN, are very well-known and well-explored, there exist a whole set of new
opportunities and research directions at the intersection of these two fields
which are relatively or even completely unexplored. One such example would be
the use of a set of robotic routers to set up a temporary communication path
between a sender and a receiver that uses the controlled mobility to the
advantage of packet routing. We find that there exist only a limited number of
articles to be directly categorized as RWSN related works whereas there exist a
range of articles in the robotics and the WSN literature that are also relevant
to this new field of research. To connect the dots, we first identify the core
problems and research trends related to RWSN such as connectivity,
localization, routing, and robust flow of information. Next, we classify the
existing research on RWSN as well as the relevant state-of-the-arts from
robotics and WSN community according to the problems and trends identified in
the first step. Lastly, we analyze what is missing in the existing literature,
and identify topics that require more research attention in the future
Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses
Wireless Sensor Networks (WSNs) are rapidly emerging as an important new area
in wireless and mobile computing research. Applications of WSNs are numerous
and growing, and range from indoor deployment scenarios in the home and office
to outdoor deployment scenarios in adversary's territory in a tactical
battleground (Akyildiz et al., 2002). For military environment, dispersal of
WSNs into an adversary's territory enables the detection and tracking of enemy
soldiers and vehicles. For home/office environments, indoor sensor networks
offer the ability to monitor the health of the elderly and to detect intruders
via a wireless home security system. In each of these scenarios, lives and
livelihoods may depend on the timeliness and correctness of the sensor data
obtained from dispersed sensor nodes. As a result, such WSNs must be secured to
prevent an intruder from obstructing the delivery of correct sensor data and
from forging sensor data. To address the latter problem, end-to-end data
integrity checksums and post-processing of senor data can be used to identify
forged sensor data (Estrin et al., 1999; Hu et al., 2003a; Ye et al., 2004).
The focus of this chapter is on routing security in WSNs. Most of the currently
existing routing protocols for WSNs make an optimization on the limited
capabilities of the nodes and the application-specific nature of the network,
but do not any the security aspects of the protocols. Although these protocols
have not been designed with security as a goal, it is extremely important to
analyze their security properties. When the defender has the liabilities of
insecure wireless communication, limited node capabilities, and possible
insider threats, and the adversaries can use powerful laptops with high energy
and long range communication to attack the network, designing a secure routing
protocol for WSNs is obviously a non-trivial task.Comment: 32 pages, 5 figures, 4 tables 4. arXiv admin note: substantial text
overlap with arXiv:1011.152
Mobile Ad-Hoc Networks
Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks
- …