1,140 research outputs found

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    A Survey of Access Control Models in Wireless Sensor Networks

    Get PDF
    Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.Peer reviewe

    A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles

    Get PDF
    The evolution in micro-electro-mechanical systems technology (MEMS) has triggered the need for the development of wireless sensor network (WSN). These wireless sensor nodes has been used in many applications at many areas. One of the main issues in WSN is the energy availability, which is always a constraint. In a previous research, a relocating algorithm for mobile sensor network had been introduced and the goal was to save energy and prolong the lifetime of the sensor networks using Particle Swarm Optimization (PSO) where both of sensing radius and travelled distance had been optimized in order to save energy in long-term and shortterm. Yet, the previous research did not take into account obstacles’ existence in the field and this will cause the sensor nodes to consume more power if obstacles are exists in the sensing field. In this project, the same centralized relocating algorithm from the previous research has been used where 15 mobile sensors deployed randomly in a field of 100 meter by 100 meter where these sensors has been deployed one time in a field that obstacles does not exist (case 1) and another time in a field that obstacles existence has been taken into account (case 2), in which these obstacles has been pre-defined positions, where these two cases applied into two different algorithms, which are the original algorithm of a previous research and the modified algorithm of this thesis. Particle Swarm Optimization has been used in the proposed algorithm to minimize the fitness function. Voronoi diagram has also used in order to ensure that the mobile sensors cover the whole sensing field. In this project, the objectives will be mainly focus on the travelling distance, which is the mobility module, of the mobile sensors in the network because the distance that the sensor node travels, will consume too much power from this node and this will lead to shortening the lifetime of the sensor network. So, the travelling distance, power consumption and lifetime of the network will be calculated in both cases for original algorithm and modified algorithm, which is a modified deployment algorithm, and compared between them. Moreover, the maximum sensing range is calculated, which is 30 meter, by using the binary sensing model even though the sensing module does not consume too much power compared to the mobility module. Finally, the comparison of the results in the original method will show that this algorithm is not suitable for an environment where obstacle exist because sensors will consume too much power compared to the sensors that deployed in environment that free of obstacles. While the results of the modified algorithm of this research will be more suitable for both environments, that is environment where obstacles are not exist and environment where obstacles are exist, because sensors in this algorithm .will consume almost the same amount of power at both of these environments

    Smart Wireless Sensor Networks

    Get PDF
    The recent development of communication and sensor technology results in the growth of a new attractive and challenging area - wireless sensor networks (WSNs). A wireless sensor network which consists of a large number of sensor nodes is deployed in environmental fields to serve various applications. Facilitated with the ability of wireless communication and intelligent computation, these nodes become smart sensors which do not only perceive ambient physical parameters but also be able to process information, cooperate with each other and self-organize into the network. These new features assist the sensor nodes as well as the network to operate more efficiently in terms of both data acquisition and energy consumption. Special purposes of the applications require design and operation of WSNs different from conventional networks such as the internet. The network design must take into account of the objectives of specific applications. The nature of deployed environment must be considered. The limited of sensor nodes� resources such as memory, computational ability, communication bandwidth and energy source are the challenges in network design. A smart wireless sensor network must be able to deal with these constraints as well as to guarantee the connectivity, coverage, reliability and security of network's operation for a maximized lifetime. This book discusses various aspects of designing such smart wireless sensor networks. Main topics includes: design methodologies, network protocols and algorithms, quality of service management, coverage optimization, time synchronization and security techniques for sensor networks

    Wireless communication, identification and sensing technologies enabling integrated logistics: a study in the harbor environment

    Get PDF
    In the last decade, integrated logistics has become an important challenge in the development of wireless communication, identification and sensing technology, due to the growing complexity of logistics processes and the increasing demand for adapting systems to new requirements. The advancement of wireless technology provides a wide range of options for the maritime container terminals. Electronic devices employed in container terminals reduce the manual effort, facilitating timely information flow and enhancing control and quality of service and decision made. In this paper, we examine the technology that can be used to support integration in harbor's logistics. In the literature, most systems have been developed to address specific needs of particular harbors, but a systematic study is missing. The purpose is to provide an overview to the reader about which technology of integrated logistics can be implemented and what remains to be addressed in the future
    • …
    corecore