31,129 research outputs found

    Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks

    Get PDF
    Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN), which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks

    Collaborative Beamforming for Distributed Wireless Ad Hoc Sensor Networks

    Full text link
    The performance of collaborative beamforming is analyzed using the theory of random arrays. The statistical average and distribution of the beampattern of randomly generated phased arrays is derived in the framework of wireless ad hoc sensor networks. Each sensor node is assumed to have a single isotropic antenna and nodes in the cluster collaboratively transmit the signal such that the signal in the target direction is coherently added in the far- eld region. It is shown that with N sensor nodes uniformly distributed over a disk, the directivity can approach N, provided that the nodes are located sparsely enough. The distribution of the maximum sidelobe peak is also studied. With the application to ad hoc networks in mind, two scenarios, closed-loop and open-loop, are considered. Associated with these scenarios, the effects of phase jitter and location estimation errors on the average beampattern are also analyzed.Comment: To appear in the IEEE Transactions on Signal Processin

    Social Network Analysis Based Localization Technique with Clustered Closeness Centrality for 3D Wireless Sensor Networks

    Full text link
    [EN] In this paper, we proposed a new wireless localization technique based on the ideology of social network analysis (SNA), to study the different properties of networks as a graph. Centrality is a main concept in SNA, so we propose using closeness centrality (CC) as a measurement to denote the importance of the node inside the network due to its geo-location to others. The node with highest degree of CC is chosen as a cluster heads, then each cluster head can form its trilateration process to collect data from its cluster. The selection of closest cluster based on CC values, and the unknown node's location can be estimated through the trilateration process. To form a perfect trilateration, the cluster head chooses three anchor nodes. The proposed algorithm provides high accuracy even in different network topologies like concave shape, O shape, and C shape as compared to existing received signal strength indicator (RSSI) techniques. Matlab simulation results based on practical radio propagation data sets showed a localization error of 0.32 m with standard deviation of 0.26 m.This work was fully supported by the Vice Chancellor Doctoral Scholarship at Auckland University of Technology, New Zealand.Ahmad, T.; Li, XJ.; Seet, B.; Cano, J. (2020). Social Network Analysis Based Localization Technique with Clustered Closeness Centrality for 3D Wireless Sensor Networks. Electronics. 9(5):1-19. https://doi.org/10.3390/electronics9050738S11995Zhou, B., Yao, X., Yang, L., Yang, S., Wu, S., Kim, Y., & Ai, L. (2019). Accurate Rigid Body Localization Using DoA Measurements from a Single Base Station. Electronics, 8(6), 622. doi:10.3390/electronics8060622Ahmad, T., Li, X., & Seet, B.-C. (2017). Parametric Loop Division for 3D Localization in Wireless Sensor Networks. Sensors, 17(7), 1697. doi:10.3390/s17071697Kaur, A., Kumar, P., & Gupta, G. P. (2019). A weighted centroid localization algorithm for randomly deployed wireless sensor networks. Journal of King Saud University - Computer and Information Sciences, 31(1), 82-91. doi:10.1016/j.jksuci.2017.01.007Khelifi, F., Bradai, A., Benslimane, A., Rawat, P., & Atri, M. (2018). A Survey of Localization Systems in Internet of Things. Mobile Networks and Applications, 24(3), 761-785. doi:10.1007/s11036-018-1090-3Sanchez-Iborra, R., G. Liaño, I., Simoes, C., Couñago, E., & Skarmeta, A. (2018). Tracking and Monitoring System Based on LoRa Technology for Lightweight Boats. Electronics, 8(1), 15. doi:10.3390/electronics8010015Sayed, A. H., Tarighat, A., & Khajehnouri, N. (2005). Network-based wireless location: challenges faced in developing techniques for accurate wireless location information. IEEE Signal Processing Magazine, 22(4), 24-40. doi:10.1109/msp.2005.1458275Maşazade, E., Ruixin Niu, Varshney, P. K., & Keskinoz, M. (2010). Energy Aware Iterative Source Localization for Wireless Sensor Networks. IEEE Transactions on Signal Processing, 58(9), 4824-4835. doi:10.1109/tsp.2010.2051433Yang, X., Kong, Q., & Xie, X. (2009). One-Dimensional Localization Algorithm Based on Signal Strength Ratio. International Journal of Distributed Sensor Networks, 5(1), 79-79. doi:10.1080/15501320802571822Xie, S., Wang, T., Hao, X., Yang, M., Zhu, Y., & Li, Y. (2019). Localization and Frequency Identification of Large-Range Wide-Band Electromagnetic Interference Sources in Electromagnetic Imaging System. Electronics, 8(5), 499. doi:10.3390/electronics8050499Zhu, X., Wu, X., & Chen, G. (2013). Relative localization for wireless sensor networks with linear topology. Computer Communications, 36(15-16), 1581-1591. doi:10.1016/j.comcom.2013.07.007Meng, W., Xiao, W., & Xie, L. (2011). An Efficient EM Algorithm for Energy-Based Multisource Localization in Wireless Sensor Networks. IEEE Transactions on Instrumentation and Measurement, 60(3), 1017-1027. doi:10.1109/tim.2010.2047035Lim, H., & Hou, J. C. (2009). Distributed localization for anisotropic sensor networks. ACM Transactions on Sensor Networks, 5(2), 1-26. doi:10.1145/1498915.1498917Xiaohong Sheng, & Yu-Hen Hu. (2005). Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks. IEEE Transactions on Signal Processing, 53(1), 44-53. doi:10.1109/tsp.2004.838930Yun Wang, Xiaodong Wang, Demin Wang, & Agrawal, D. P. (2009). Range-Free Localization Using Expected Hop Progress in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 20(10), 1540-1552. doi:10.1109/tpds.2008.239Huang, H., & Zheng, Y. R. (2018). Node localization with AoA assistance in multi-hop underwater sensor networks. Ad Hoc Networks, 78, 32-41. doi:10.1016/j.adhoc.2018.05.005Zàruba, G. V., Huber, M., Kamangar, F. A., & Chlamtac, I. (2006). Indoor location tracking using RSSI readings from a single Wi-Fi access point. Wireless Networks, 13(2), 221-235. doi:10.1007/s11276-006-5064-1Singh, M., & Khilar, P. M. (2015). An analytical geometric range free localization scheme based on mobile beacon points in wireless sensor network. Wireless Networks, 22(8), 2537-2550. doi:10.1007/s11276-015-1116-8Yiqiang Chen, Qiang Yang, Jie Yin, & Xiaoyong Chai. (2006). Power-efficient access-point selection for indoor location estimation. IEEE Transactions on Knowledge and Data Engineering, 18(7), 877-888. doi:10.1109/tkde.2006.112Alzoubi, K., Li, X.-Y., Wang, Y., Wan, P.-J., & Frieder, O. (2003). Geometric spanners for wireless ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 14(4), 408-421. doi:10.1109/tpds.2003.1195412Safa, H. (2014). A novel localization algorithm for large scale wireless sensor networks. Computer Communications, 45, 32-46. doi:10.1016/j.comcom.2014.03.020Kaemarungsi, K., & Krishnamurthy, P. (2012). Analysis of WLAN’s received signal strength indication for indoor location fingerprinting. Pervasive and Mobile Computing, 8(2), 292-316. doi:10.1016/j.pmcj.2011.09.003Patwari, N., Hero, A. O., Perkins, M., Correal, N. S., & O’Dea, R. J. (2003). Relative location estimation in wireless sensor networks. IEEE Transactions on Signal Processing, 51(8), 2137-2148. doi:10.1109/tsp.2003.814469Niculescu, D. (2003). Telecommunication Systems, 22(1/4), 267-280. doi:10.1023/a:1023403323460Mahyar, H., Hasheminezhad, R., Ghalebi K., E., Nazemian, A., Grosu, R., Movaghar, A., & Rabiee, H. R. (2018). Compressive sensing of high betweenness centrality nodes in networks. Physica A: Statistical Mechanics and its Applications, 497, 166-184. doi:10.1016/j.physa.2017.12.145Plets, D., Bastiaens, S., Martens, L., & Joseph, W. (2019). An Analysis of the Impact of LED Tilt on Visible Light Positioning Accuracy. Electronics, 8(4), 389. doi:10.3390/electronics8040389RSSI Datasethttps://github.com/pspachos/RSSI-DatasetAhmad, T., Li, X. J., & Seet, B.-C. (2019). Noise Reduction Scheme for Parametric Loop Division 3D Wireless Localization Algorithm Based on Extended Kalman Filtering. Journal of Sensor and Actuator Networks, 8(2), 24. doi:10.3390/jsan8020024Benson, S. J., Ye, Y., & Zhang, X. (2000). Solving Large-Scale Sparse Semidefinite Programs for Combinatorial Optimization. SIAM Journal on Optimization, 10(2), 443-461. doi:10.1137/s105262349732800

    Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods

    Get PDF
    Location-free boundary recognition is crucial and critical for many fundamental network functionalities in wireless ad hoc and sensor networks. Previous designs, often coarse-grained, fail to accurately locate boundaries, especially when small holes exist. To address this issue, we propose a fine-grained boundary recognition approach using connectivity information only. This algorithm accurately discovers inner and outer boundary cycles without using location information. To the best of our knowledge, this is the first design being able to determinately locate all hole boundaries no matter how small the holes are. Also, this distributed algorithm does not rely on high node density. We formally prove the correctness of our design, and evaluate its effectiveness through extensive simulations. Categories and Subject Descriptor

    A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks

    Full text link
    This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanismsComment: 15 page

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    Dynamic services in mobile ad hoc networks

    Get PDF
    The increasing diffusion of wireless-enabled portable devices is pushing toward the design of novel service scenarios, promoting temporary and opportunistic interactions in infrastructure-less environments. Mobile Ad Hoc Networks (MANET) are the general model of these higly dynamic networks that can be specialized, depending on application cases, in more specific and refined models such as Vehicular Ad Hoc Networks and Wireless Sensor Networks. Two interesting deployment cases are of increasing relevance: resource diffusion among users equipped with portable devices, such as laptops, smart phones or PDAs in crowded areas (termed dense MANET) and dissemination/indexing of monitoring information collected in Vehicular Sensor Networks. The extreme dynamicity of these scenarios calls for novel distributed protocols and services facilitating application development. To this aim we have designed middleware solutions supporting these challenging tasks. REDMAN manages, retrieves, and disseminates replicas of software resources in dense MANET; it implements novel lightweight protocols to maintain a desired replication degree despite participants mobility, and efficiently perform resource retrieval. REDMAN exploits the high-density assumption to achieve scalability and limited network overhead. Sensed data gathering and distributed indexing in Vehicular Networks raise similar issues: we propose a specific middleware support, called MobEyes, exploiting node mobility to opportunistically diffuse data summaries among neighbor vehicles. MobEyes creates a low-cost opportunistic distributed index to query the distributed storage and to determine the location of needed information. Extensive validation and testing of REDMAN and MobEyes prove the effectiveness of our original solutions in limiting communication overhead while maintaining the required accuracy of replication degree and indexing completeness, and demonstrates the feasibility of the middleware approach

    A Review of Interference Reduction in Wireless Networks Using Graph Coloring Methods

    Full text link
    The interference imposes a significant negative impact on the performance of wireless networks. With the continuous deployment of larger and more sophisticated wireless networks, reducing interference in such networks is quickly being focused upon as a problem in today's world. In this paper we analyze the interference reduction problem from a graph theoretical viewpoint. A graph coloring methods are exploited to model the interference reduction problem. However, additional constraints to graph coloring scenarios that account for various networking conditions result in additional complexity to standard graph coloring. This paper reviews a variety of algorithmic solutions for specific network topologies.Comment: 10 pages, 5 figure
    • …
    corecore