2,049 research outputs found

    Solutions and Tools for Secure Communication in Wireless Sensor Networks

    Get PDF
    Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of security material, and effective prevention and reaction against security threats and attacks. However, WSNs are mainly composed of resource-constrained devices. That is, network nodes feature reduced capabilities, especially in terms of memory storage, computing power, transmission rate, and energy availability. As a consequence, assuring secure communication in WSNs results to be more difficult than in other kinds of network. In fact, trading effectiveness of adopted solutions with their efficiency becomes far more important. In addition, specific device classes or technologies may require to design ad hoc security solutions. Also, it is necessary to efficiently manage security material, and dynamically cope with changes of security requirements. Finally, security threats and countermeasures have to be carefully considered since from the network design phase. This Ph.D. dissertion considers secure communication in WSNs, and provides the following contributions. First, we provide a performance evaluation of IEEE 802.15.4 security services. Then, we focus on the ZigBee technology and its security services, and propose possible solutions to some deficiencies and inefficiencies. Second, we present HISS, a highly scalable and efficient key management scheme, able to contrast collusion attacks while displaying a graceful degradation of performance. Third, we present STaR, a software component for WSNs that secures multiple traffic flows at the same time. It is transparent to the application, and provides runtime reconfigurability, thus coping with dynamic changes of security requirements. Finally, we describe ASF, our attack simulation framework for WSNs. Such a tool helps network designers to quantitatively evaluate effects of security attacks, produce an attack ranking based on their severity, and thus select the most appropriate countermeasures

    Roadmaps to Utopia: Tales of the Smart City

    No full text
    Notions of the Smart City are pervasive in urban development discourses. Various frameworks for the development of smart cities, often conceptualized as roadmaps, make a number of implicit claims about how smart city projects proceed but the legitimacy of those claims is unclear. This paper begins to address this gap in knowledge. We explore the development of a smart transport application, MotionMap, in the context of a £16M smart city programme taking place in Milton Keynes, UK. We examine how the idealized smart city narrative was locally inflected, and discuss the differences between the narrative and the processes and outcomes observed in Milton Keynes. The research shows that the vision of data-driven efficiency outlined in the roadmaps is not universally compelling, and that different approaches to the sensing and optimization of urban flows have potential for empowering or disempowering different actors. Roadmaps tend to emphasize the importance of delivering quick practical results. However, the benefits observed in Milton Keynes did not come from quick technical fixes but from a smart city narrative that reinforced existing city branding, mobilizing a growing network of actors towards the development of a smart region. Further research is needed to investigate this and other smart city developments, the significance of different smart city narratives, and how power relationships are reinforced and constructed through them

    Stability of secure routing protocol in ad hoc wireless network.

    Get PDF
    The contributions of this research are threefold. First, it offers a new routing approach to ad hoc wireless network protocols: the Enhanced Heading-direction Angle Routing Protocol (EHARP), which is an enhancement of HARP based on an on-demand routing scheme. We have added important features to overcome its disadvantages and improve its performance, providing the stability and availability required to guarantee the selection of the best path. Each node in the network is able to classify its neighbouring nodes according to their heading directions into four different zone-direction group. The second contribution is to present a new Secure Enhanced Heading-direction Angle Routing Protocol (SEHARP) for ad hoc networks based on the integration of security mechanisms that could be applied to the EHARP routing protocol. Thirdly, we present a new approach to security of access in hostile environments based on the history and relationships among the nodes and on digital operation certificates. We also propose an access activity diagram which explains the steps taken by a node. Security depends on access to the history of each unit, which is used to calculate the cooperative values of each node in the environment

    Self-adaptive Routing in Multi-hop Sensor Networks

    Get PDF
    Sensor networks are used for applications in monitoring harsh environments including reconnaissance and surveillance of areas that may be inaccessible to humans. Such applications depend on reliable collection, distribution and delivery of information to processing centres which may involve multi-hop wireless networks which experience disruptions in communication and exhibit packet drops, connectivity loss and congestion. Some of these faults are periodic, attributed to external, recurring factors. In this paper, we study an effective way to forecast such repetitive conditions using time-series analysis. We, further, present an application-level, autonomic routing service that adapts sensor readings routes to avoid areas in which failures or congestion are expected. A prototype system of the approach is developed based on an existing middleware solution for sensor network management. Simulation results on the performance of this approach are also presented. © 2011 IFIP.Accepted versio
    • …
    corecore