940 research outputs found

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    The Methods to Improve Quality of Service by Accounting Secure Parameters

    Full text link
    A solution to the problem of ensuring quality of service, providing a greater number of services with higher efficiency taking into account network security is proposed. In this paper, experiments were conducted to analyze the effect of self-similarity and attacks on the quality of service parameters. Method of buffering and control of channel capacity and calculating of routing cost method in the network, which take into account the parameters of traffic multifractality and the probability of detecting attacks in telecommunications networks were proposed. The both proposed methods accounting the given restrictions on the delay time and the number of lost packets for every type quality of service traffic. During simulation the parameters of transmitted traffic (self-similarity, intensity) and the parameters of network (current channel load, node buffer size) were changed and the maximum allowable load of network was determined. The results of analysis show that occurrence of overload when transmitting traffic over a switched channel associated with multifractal traffic characteristics and presence of attack. It was shown that proposed methods can reduce the lost data and improve the efficiency of network resources.Comment: 10 pages, 1 figure, 1 equation, 1 table. arXiv admin note: text overlap with arXiv:1904.0520

    Modeling of Environmental Influences at the Signal Transmission in the Optical Transmission Medium

    Get PDF
    This contribution discusses characteristics of environmental influences on transmitted signals in the optical transmission medium. A main attention is focused on the explanation of simulation methods for substantial linear and nonlinear negative effects in the optical fiber presented by the proposed simulation model. The paper also presents characteristics of modulation techniques utilized in the optical transmission medium. Finally, a comparison of different modulation techniques affected by various environmental influences in this simulation model is presented

    A Study of Innovative Technologies for Energy-Efficient Enterprise Management of Wireless Heterogeneous Networks in Collaborative Communications

    Get PDF
    Collaborative communication technology has become a popular research area in wireless communications due to its ability to resist varying degrees of channel fading through the collaborative transmission of network nodes. This thesis focuses on energy-efficient collaborative communication systems in increasingly complex environments in heterogeneous wireless networks, with the aim of optimizing energy efficiency and improving user data rates in small areas (e.g., within an enterprise). A brief introduction to the basic technologies of wireless energy-carrying collaborative communication systems is given, summarising relay forwarding strategies, three basic communication models, and energy and information co-transmission reception mechanisms before proposing an ED-OEH relaying protocol at the end of the section that integrates energy classification and opportunity energy harvesting. Immediately afterwards, the heterogeneity of network nodes in terms of computation and storage is pointed out, and a sensor network security protocol based on a hybrid encryption regime is designed. Finally, the problem of intra-enterprise resource allocation and energy efficiency optimization in heterogeneous wireless network scenarios based on deep augmented learning algorithms is investigated. Nature DQN is used as the core algorithm, and the input dimension and loss function in traditional neural networks are improved to reduce the complexity of the algorithm. Experimental results show that the Nature DQN algorithm converges faster than traditional algorithms such as Q-learning, and the energy efficiency ratio can reach up to 300%

    Modeling of the PSK utilization at the signal transmission in the optical transmission medium

    Get PDF
    This paper deals with a modeling of the phase shift keying (PSK) and the possibility of implementing PSK modulations using Mach-Zehnder modulators in the Matlab simulation environment. Next, a simulation of selected multi-level PSK modulations utilizing at the signal transmission in the optical transmission medium is executed. Finally, a comparison of modulated optical signals before and after passing a model of the optical transmission path is introduced, using constellation diagrams, signal characteristics, eye diagrams and waterfall curves of individual signals

    Urban Air Pollution Monitoring Using Wireless Sensor Networks: A Comprehensive Review

    Get PDF
    Air pollution is evolving as a severe environmental concern due to its enormous impact on the well being of the people, universal environment and also on the global economy. Conventional air pollution systems are not able to provide air pollution data of high spatiotemporal resolution due to non-scalability and limited data availability. With the advances in the areas of Micro Electro Mechanical Sensor (MEMS) and Wireless Sensor Network (WSN), the researchers had implemented various state-of-the-art air pollution monitoring systems with better and efficient results. A comprehensive review of continuous air pollution surveillance of both indoor and outdoor pollution by employing WSN was presented. In the proposed paper attempts to provide the details related to the existing methods for measuring major air pollutants like CO2, CO, O3, SO2, VOC and Particulate Matter (PM). It presents the various methods, algorithms and dedicated network designs in air pollution monitoring which are useful for generating new solutions to improve the performance through WSN. A comprehensive and detailed review of the existing methods of Air Quality Monitoring systems using WSN was done along with their comparison

    Impact of Environmental Influences on Multilevel Modulation Formats at the Signal Transmission in the Optical Transmission Medium

    Get PDF
    This paper is devoted to the analysis of environmental influences in the optical transmission medium and their impacts on multilevel modulation formats. An attention is focused on main features and characteristics of environmental negative influences of optical fibers. Consequently, principles for appropriate multilevel modulation formats are introduced together with block schemes representing their main functionalities. The created Simulink model for technologies and communications is verified for real conditions in the optical transmission medium. It can allow executing requested analysis for environmental influences on advanced multilevel modulation formats at the signal transmission. Finally, a comparison of considered multilevel modulations is introduced, using constellation diagrams, signal characteristics, eye diagrams and waterfall curves of individual signals

    SecNetworkCloudSim: An Extensible Simulation Tool for Secure Distributed Mobile Applications

    Get PDF
    Fueled by the wide interest for achieving rich-storage services with the lowest possible cost, cloud computing has emerged into a highly desired service paradigm extending well beyond Virtualization technology. The next generation of mobile cloud services is now manipulated more and more sensitive data on VM-based distributed applications. Therefore, the need to secure sensitive data over mobile cloud computing is more evident than ever. However, despite the widespread release of several cloud simulators, controlling user’s access and protecting data exchanges in distributed mobile applications over the cloud is considered a major challenge. This paper introduces a new NetworkCloudSim extension named SecNetworkCloudSim, a secure mobile simulation tool which is deliberately designed to ensure the preservation of confidential access to data hosted on mobile device and distributed cloud’s servers. Through high-level mobile users’ requests, users connect to an underlying proxy which is considered an important layer in this new simulator, where users perform secure authentication access to cloud services, allocate their tasks in secure VM-based policy, manage automatically the data confidentiality among VMs and derive high efficiency and coverage rates. Most importantly, due to the secure nature of proxy, user’s distributed tasks can be executed without alterations on different underlying proxy’s security policies. We implement a scenario of follow-up healthcare distributed application using the new extension

    Capacity Enhancement of Multiuser Wireless Communication System through Adaptive Non-Linear Pre coding

    Get PDF
    Multiuser multiple-input multiple-output (MIMO) nonlinear pre coding techniques face the issue of poor computational scalability of the size of the network. But by this nonlinear pre coding technique the interference is pre-cancelled automatically and also provides better capacity. So in order to reduce the computational burden in this paper, a definitive issue of MU-MIMO scalability is tackled through a non-linear adaptive optimum vector perturbation technique. Unlike the conventional (Vector Perturbation) VP methods, here a novel anterograde tracing is utilized which is usually recognized in the nervous system thus reducing complexity. The tracing of distance can be done through an iterative-optimization procedure. By this novel non-linear technique the capacity is improved to a greater extend which is explained practically. By means of this, the computational complexity is managed to be in the cubic order of the size of MUMIMO, and this mainly derives from the inverse of the channel matrix. The proposed signal processing system has been implemented in the working platform of MATLAB/SIMULINK. The simulation results of proposed communication system and comparison with existing systems shows the significance of the proposed work
    • …
    corecore