1,140 research outputs found
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
A Survey of Access Control Models in Wireless Sensor Networks
Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.Peer reviewe
A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles
The evolution in micro-electro-mechanical systems technology (MEMS) has
triggered the need for the development of wireless sensor network (WSN). These
wireless sensor nodes has been used in many applications at many areas. One of the
main issues in WSN is the energy availability, which is always a constraint. In a
previous research, a relocating algorithm for mobile sensor network had been
introduced and the goal was to save energy and prolong the lifetime of the sensor
networks using Particle Swarm Optimization (PSO) where both of sensing radius and
travelled distance had been optimized in order to save energy in long-term and shortterm.
Yet, the previous research did not take into account obstacles’ existence in the
field and this will cause the sensor nodes to consume more power if obstacles are
exists in the sensing field. In this project, the same centralized relocating algorithm
from the previous research has been used where 15 mobile sensors deployed
randomly in a field of 100 meter by 100 meter where these sensors has been
deployed one time in a field that obstacles does not exist (case 1) and another time in
a field that obstacles existence has been taken into account (case 2), in which these
obstacles has been pre-defined positions, where these two cases applied into two
different algorithms, which are the original algorithm of a previous research and the
modified algorithm of this thesis. Particle Swarm Optimization has been used in the
proposed algorithm to minimize the fitness function. Voronoi diagram has also used
in order to ensure that the mobile sensors cover the whole sensing field. In this
project, the objectives will be mainly focus on the travelling distance, which is the
mobility module, of the mobile sensors in the network because the distance that the
sensor node travels, will consume too much power from this node and this will lead
to shortening the lifetime of the sensor network. So, the travelling distance, power
consumption and lifetime of the network will be calculated in both cases for original
algorithm and modified algorithm, which is a modified deployment algorithm, and compared between them. Moreover, the maximum sensing range is calculated, which
is 30 meter, by using the binary sensing model even though the sensing module does
not consume too much power compared to the mobility module. Finally, the
comparison of the results in the original method will show that this algorithm is not
suitable for an environment where obstacle exist because sensors will consume too
much power compared to the sensors that deployed in environment that free of
obstacles. While the results of the modified algorithm of this research will be more
suitable for both environments, that is environment where obstacles are not exist and
environment where obstacles are exist, because sensors in this algorithm .will
consume almost the same amount of power at both of these environments
Smart Wireless Sensor Networks
The recent development of communication and sensor technology results in the growth of a new attractive and challenging area - wireless sensor networks (WSNs). A wireless sensor network which consists of a large number of sensor nodes is deployed in environmental fields to serve various applications. Facilitated with the ability of wireless communication and intelligent computation, these nodes become smart sensors which do not only perceive ambient physical parameters but also be able to process information, cooperate with each other and self-organize into the network. These new features assist the sensor nodes as well as the network to operate more efficiently in terms of both data acquisition and energy consumption. Special purposes of the applications require design and operation of WSNs different from conventional networks such as the internet. The network design must take into account of the objectives of specific applications. The nature of deployed environment must be considered. The limited of sensor nodes� resources such as memory, computational ability, communication bandwidth and energy source are the challenges in network design. A smart wireless sensor network must be able to deal with these constraints as well as to guarantee the connectivity, coverage, reliability and security of network's operation for a maximized lifetime. This book discusses various aspects of designing such smart wireless sensor networks. Main topics includes: design methodologies, network protocols and algorithms, quality of service management, coverage optimization, time synchronization and security techniques for sensor networks
Wireless communication, identification and sensing technologies enabling integrated logistics: a study in the harbor environment
In the last decade, integrated logistics has become an important challenge in
the development of wireless communication, identification and sensing
technology, due to the growing complexity of logistics processes and the
increasing demand for adapting systems to new requirements. The advancement of
wireless technology provides a wide range of options for the maritime container
terminals. Electronic devices employed in container terminals reduce the manual
effort, facilitating timely information flow and enhancing control and quality
of service and decision made. In this paper, we examine the technology that can
be used to support integration in harbor's logistics. In the literature, most
systems have been developed to address specific needs of particular harbors,
but a systematic study is missing. The purpose is to provide an overview to the
reader about which technology of integrated logistics can be implemented and
what remains to be addressed in the future
- …