1,070 research outputs found

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    Decisive analysis of current state of the art in congestion aware and control routing models in ad hoc networks

    Get PDF
    An important aspect that portrays a crucial position in the ad hoc network routing is congestion. Almost every research analysis is en-route in adapting this key factor in addressing congestion. This problem cannot be totally addressed by the regular TCP protocol based networks, keeping in view the special assets which include multi hop sharing etc, which is difficult to ascertain in ad hoc networks. Many attempts have been made and are in progress by researchers to provide unique solutions to the above mentioned problems. This paper projects a vital study on jamming aware and different routing standards that have been dealt with in recent times

    Optimization and Efficient Transmission Schedule for 802.11 Networks with Jamming Characteristics

    Get PDF
    In Wireless 802.11 networks, Multiple-path source routing allows data source node to distribute the total traffic among the possible available paths. However, in this case jamming effects were not considered. Recent work has presented jamming mitigation scheme, anti-jamming Reinforcement System on 802.11 networks by assessing physical-layer functions such as rate adaptation and power control. Rate adaptation algorithms significantly degrade network performance. Appropriate tuning of carrier sensing threshold allows transmitter to send packets even on jam that enable receiver to capture desired signal. Efficient schedules need to be investigated for redundant transmission to perform well in presence of jammer. In this paper, the proposal in our work presents an Efficient Time and Transmission Schedule Scheme for wireless 802.11 networks in presence of jamming that guarantee low waiting time and low staleness of data. Schedules are optimal even jamming signal has energy limitations. Each packet is encoded by an errorcorrecting code (Reed-Solomon). Reed solomon code allow schedule to minimize waiting time of the clients and staleness of the received data. Jammers have restrictions on length of jamming pulses and length of intervals between subsequent jamming pulses
    • …
    corecore