27 research outputs found

    Impact of Random Deployment on Operation and Data Quality of Sensor Networks

    Get PDF
    Several applications have been proposed for wireless sensor networks, including habitat monitoring, structural health monitoring, pipeline monitoring, and precision agriculture. Among the desirable features of wireless sensor networks, one is the ease of deployment. Since the nodes are capable of self-organization, they can be placed easily in areas that are otherwise inaccessible to or impractical for other types of sensing systems. In fact, some have proposed the deployment of wireless sensor networks by dropping nodes from a plane, delivering them in an artillery shell, or launching them via a catapult from onboard a ship. There are also reports of actual aerial deployments, for example the one carried out using an unmanned aerial vehicle (UAV) at a Marine Corps combat centre in California -- the nodes were able to establish a time-synchronized, multi-hop communication network for tracking vehicles that passed along a dirt road. While this has a practical relevance for some civil applications (such as rescue operations), a more realistic deployment involves the careful planning and placement of sensors. Even then, nodes may not be placed optimally to ensure that the network is fully connected and high-quality data pertaining to the phenomena being monitored can be extracted from the network. This work aims to address the problem of random deployment through two complementary approaches: The first approach aims to address the problem of random deployment from a communication perspective. It begins by establishing a comprehensive mathematical model to quantify the energy cost of various concerns of a fully operational wireless sensor network. Based on the analytic model, an energy-efficient topology control protocol is developed. The protocol sets eligibility metric to establish and maintain a multi-hop communication path and to ensure that all nodes exhaust their energy in a uniform manner. The second approach focuses on addressing the problem of imperfect sensing from a signal processing perspective. It investigates the impact of deployment errors (calibration, placement, and orientation errors) on the quality of the sensed data and attempts to identify robust and error-agnostic features. If random placement is unavoidable and dense deployment cannot be supported, robust and error-agnostic features enable one to recognize interesting events from erroneous or imperfect data

    Replica Dissemination and Update Strategies in Cluster-Based Mobile Ad Hoc Networks

    Get PDF

    Investigation and Implementation of Beacon Technology for Man Tracking in Oil and Gas Industry

    Get PDF
    The oil and gas industry deals with various challenges, and one of it is to comply with frequently changing environmental regulations in monitoring and management system. In this project, the focus will be in the necessity for oil and gas industry to monitor the movement of their employees especially for whom that were conducting tasks in remote areas to wisely optimise the runway resources while simultaneously reaching the needs of delivery schedules. To oversee the workers position, a comprehensive floor mapping system that indicates the real-time status of individuals is required on 24/7 basis. Therefore, the use of beacon system with IOT platform will be applied in this project. The concept is such as the employees are required to carry a customised beacon badge, for this badge will communicate valuable information to the Bluetooth gateway that coordinates the collected information to a cloud-based system for floor mapping process. In other words, an investigation and implementation of a beacon system through a Bluetooth gateway to a cloud-based system in accordance with IEEE 802.15 standard will work out

    A Novel Framework For Prevent The Denial Of Service Attacks in MANET

    Get PDF
    In the field of networks, the Mobile ad hoc networks (MANETs) are one of the best and lively mobile networks which are capable of shaping when the infrastructure of pre-existing communication is not present. And in further to mobility, the restricted resources like storage space, bandwidth and battery power are used to categorize a MANET. The primary theory in MANETs is that the transitional nodes assist in forwarding the packets. Mobile Ad hoc Networks are very weak in terms of Denial of Service (DoS) because of their prominent characteristics. A MANET is a self-diagnostic model includes by multiple mobile wireless nodes. The node misbehaviour is due to egocentric reasons where it can considerably reduce the performance of MANET. A self-centred node endeavours to exploit the resources simply for its own intention and it hesitates to distribute the resources with their neighbours. As a result, it plays a central role to detect the self-centred nodes to progress the concert of MANET. Initially, our proposed structural design of a MANET is constructed and the message linking in the mobile is originated. The packet drop is able to ensue in MANET because of the egocentric node or network traffic. In this proposed paper, triangular vision modelling framework exploits the detection of the misbehaving nodes and the egocentric node in the MANET. The triangular vision view depicts a clear picture in identifying the ideal route by using the behaviour of nodes where it helps to detect the egocentric nodes and misbehaving nodes in the MANET. The two methods called Report Based Method (RBM) Detection and Trace and Hope based Method (THBM) detection are used to detect the egocentric nodes and misbehaving nodes in the proposed framework for the Mobile Ad hoc network. DOI: 10.17762/ijritcc2321-8169.150514

    Performance Improvement of Cache Management In Cluster Based MANET

    Full text link

    Design and implementation of a trust calculation method for network components

    Get PDF
    Today’s organizations rely on internal or cloud-infrastructures to manage their data and their products. Due to the increasing importance and complexity of these infrastructures, there is the need to implement a reliable way to monitor the trustworthiness of the devices that are part of it. It is important to establish trust within the nodes of a single or multiple security domains to enhance the security of an enterprise’s infrastructure. This thesis aims to develop and evaluate a method to measure and calculate a trust score for each node and security domain of a network infrastructure. This method will be based on a centralized verifier that collects and verifies all the security and performance-based evidence from the nodes that compose the infrastructure. The evidence verification process is based on remote attestation through the use of a hardware root of trust. Moreover, this method allows the exchange of trust scores with other security domains: this enhances inter-domain communication trustworthiness. The main advantages of this method compared to similar ones found in the literature are the possibility of an inter-domain trust exchange, the use of remote attestation, and its adaptability to work with different kinds of infrastructure. Furthermore, the tests confirmed that the method responds quickly in case of a vulnerable node

    Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

    Get PDF
    Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract)Series: Working Papers on Information Systems, Information Business and Operation

    Softwarecast : a code-based delivery Manycast scheme in heterogeneous and Opportunistic Ad Hoc Networks

    Get PDF
    In the context of Opportunistic Ad Hoc Networking paradigms, group communication schemes (Manycast) are difficult to conduct. In this article, we propose a general delivery scheme for Manycast group communications based on mobile code. Our proposal extends network addressing by moving from the static header field paradigm to a software code-based addressing scheme. We allow messages to be delivered using built-in software codes that consider application-defined, context-aware or history-based information. Additionally, we allow messages to carry a delivery state that permits them to perform refined delivery-decision-making methods. As a consequence of this scheme, we have found that new group communication schemes, besides the traditional ones, may be beneficial to improve the network performance and to provide new functionalities to emerging scenarios like intermittently connected networks of heterogeneous physical objects. We present an application of this scheme to solve, following an analytical delivery method, the problem of sending a message to k and only k nodes of a heterogeneous and opportunistic network scenario that fit best a given criterion. We show, using simulations, that our proposal performs better than traditional approaches. Finally, to show that our proposal is feasible, we present an implementation of our proposal in a real Opportunistic Ad Hoc network, a DTN network, compatible with the de facto standard Bundle Protocol
    corecore