32,182 research outputs found

    Secure location-aware communications in energy-constrained wireless networks

    Get PDF
    Wireless ad hoc network has enabled a variety of exciting civilian, industrial and military applications over the past few years. Among the many types of wireless ad hoc networks, Wireless Sensor Networks (WSNs) has gained popularity because of the technology development for manufacturing low-cost, low-power, multi-functional motes. Compared with traditional wireless network, location-aware communication is a very common communication pattern and is required by many applications in WSNs. For instance, in the geographical routing protocol, a sensor needs to know its own and its neighbors\u27 locations to forward a packet properly to the next hop. The application-aware communications are vulnerable to many malicious attacks, ranging from passive eavesdropping to active spoofing, jamming, replaying, etc. Although research efforts have been devoted to secure communications in general, the properties of energy-constrained networks pose new technical challenges: First, the communicating nodes in the network are always unattended for long periods without physical maintenance, which makes their energy a premier resource. Second, the wireless devices usually have very limited hardware resources such as memory, computation capacity and communication range. Third, the number of nodes can be potentially of very high magnitude. Therefore, it is infeasible to utilize existing secure algorithms designed for conventional wireless networks, and innovative mechanisms should be designed in a way that can conserve power consumption, use inexpensive hardware and lightweight protocols, and accommodate with the scalability of the network. In this research, we aim at constructing a secure location-aware communication system for energy-constrained wireless network, and we take wireless sensor network as a concrete research scenario. Particularly, we identify three important problems as our research targets: (1) providing correct location estimations for sensors in presence of wormhole attacks and pollution attacks, (2) detecting location anomalies according to the application-specific requirements of the verification accuracy, and (3) preventing information leakage to eavesdroppers when using network coding for multicasting location information. Our contributions of the research are as follows: First, we propose two schemes to improve the availability and accuracy of location information of nodes. Then, we study monitoring and detection techniques and propose three lightweight schemes to detect location anomalies. Finally, we propose two network coding schemes which can effectively prevent information leakage to eavesdroppers. Simulation results demonstrate the effectiveness of our schemes in enhancing security of the system. Compared to previous works, our schemes are more lightweight in terms of hardware cost, computation overhead and communication consumptions, and thus are suitable for energy-constrained wireless networks

    Efficient Information Access in Data-Intensive Sensor Networks

    Get PDF
    Recent advances in wireless communications and microelectronics have enabled wide deployment of smart sensor networks. Such networks naturally apply to a broad range of applications that involve system monitoring and information tracking (e.g., fine-grained weather/environmental monitoring, structural health monitoring, urban-scale traffic or parking monitoring, gunshot detection, monitoring volcanic eruptions, measuring rate of melting glaciers, forest fire detection, emergency medical care, disaster response, airport security infrastructure, monitoring of children in metropolitan areas, product transition in warehouse networks etc.).Meanwhile, existing wireless sensor networks (WSNs) perform poorly when the applications have high bandwidth needs for data transmission and stringent delay constraints against the network communication. Such requirements are common for Data Intensive Sensor Networks (DISNs) implementing Mission-Critical Monitoring applications (MCM applications).We propose to enhance existing wireless network standards with flexible query optimization strategies that take into account network constraints and application-specific data delivery patterns in order to meet high performance requirements of MCM applications.In this respect, this dissertation has two major contributions: First, we have developed an algebraic framework called Data Transmission Algebra (DTA) for collision-aware concurrent data transmissions. Here, we have merged the serialization concept from the databases with the knowledge of wireless network characteristics. We have developed an optimizer that uses the DTA framework, and generates an optimal data transmission schedule with respect to latency, throughput, and energy usage. We have extended the DTA framework to handle location-based trust and sensor mobility. We improved DTA scalability with Whirlpool data delivery mechanism, which takes advantage of partitioning of the network. Second, we propose relaxed optimization strategy and develop an adaptive approach to deliver data in data-intensive wireless sensor networks. In particular, we have shown that local actions at nodes help network to adapt in worse network conditions and perform better. We show that local decisions at the nodes can converge towards desirable global network properties e.g.,high packet success ratio for the network. We have also developed a network monitoring tool to assess the state and dynamic convergence of the WSN, and force it towards better performance

    Smart context-aware QoS-based admission control for biomedical wireless sensor networks

    Get PDF
    Wireless sensor networks are being used as the enabling technology that helps to support the development of new applications and services targeting the domain of healthcare, in particular, regarding data collection for continuous health monitoring of patients or to help physicians in their diagnosis and further treatment assessment. Therefore, due to the critical nature of both medical data and medical applications, such networks have to satisfy demanding quality of service requirements. Despite the efforts made in the last few years to develop quality of service mechanisms targeting wireless sensor networks and its wide range of applications, the network deployment scenario can severely restrict the network's ability to provide the required performance. Furthermore, the impact of such environments on the network performance is hard to predict and manage due to its random nature. In this way, network planning and management, in complex environments like general or step-down hospital units, is a problem still looking for a solution. In such context, this paper presents a smart context-aware quality of service based admission control method to help engineers, network administrators, and healthcare professionals managing and supervising the admission of new patients to biomedical wireless sensor networks. The proposed method was tested in a small sized hospital. In view of the results achieved during the experiments, the proposed admission control method demonstrated its ability, not only to control the admission of new patients to the biomedical wireless sensor network, but also to find the best location to admit the new patients within the network. By placing the new sensor nodes on the most favourable locations, this method is able to select the network topology in view of mitigating the quality of service provided by the network.Work supported by the Portuguese Foundation for Science and Technology, FCT, PhD Grant SFRH/BD/61278/2009. Miranda was supported by Portuguese funds through the CIDMA - Center for Research and Development in Mathematics and Applications, and the Portuguese Foundation for Science and Technology.info:eu-repo/semantics/publishedVersio

    Social Network Analysis Based Localization Technique with Clustered Closeness Centrality for 3D Wireless Sensor Networks

    Full text link
    [EN] In this paper, we proposed a new wireless localization technique based on the ideology of social network analysis (SNA), to study the different properties of networks as a graph. Centrality is a main concept in SNA, so we propose using closeness centrality (CC) as a measurement to denote the importance of the node inside the network due to its geo-location to others. The node with highest degree of CC is chosen as a cluster heads, then each cluster head can form its trilateration process to collect data from its cluster. The selection of closest cluster based on CC values, and the unknown node's location can be estimated through the trilateration process. To form a perfect trilateration, the cluster head chooses three anchor nodes. The proposed algorithm provides high accuracy even in different network topologies like concave shape, O shape, and C shape as compared to existing received signal strength indicator (RSSI) techniques. Matlab simulation results based on practical radio propagation data sets showed a localization error of 0.32 m with standard deviation of 0.26 m.This work was fully supported by the Vice Chancellor Doctoral Scholarship at Auckland University of Technology, New Zealand.Ahmad, T.; Li, XJ.; Seet, B.; Cano, J. (2020). Social Network Analysis Based Localization Technique with Clustered Closeness Centrality for 3D Wireless Sensor Networks. Electronics. 9(5):1-19. https://doi.org/10.3390/electronics9050738S11995Zhou, B., Yao, X., Yang, L., Yang, S., Wu, S., Kim, Y., & Ai, L. (2019). Accurate Rigid Body Localization Using DoA Measurements from a Single Base Station. Electronics, 8(6), 622. doi:10.3390/electronics8060622Ahmad, T., Li, X., & Seet, B.-C. (2017). Parametric Loop Division for 3D Localization in Wireless Sensor Networks. Sensors, 17(7), 1697. doi:10.3390/s17071697Kaur, A., Kumar, P., & Gupta, G. P. (2019). A weighted centroid localization algorithm for randomly deployed wireless sensor networks. Journal of King Saud University - Computer and Information Sciences, 31(1), 82-91. doi:10.1016/j.jksuci.2017.01.007Khelifi, F., Bradai, A., Benslimane, A., Rawat, P., & Atri, M. (2018). A Survey of Localization Systems in Internet of Things. Mobile Networks and Applications, 24(3), 761-785. doi:10.1007/s11036-018-1090-3Sanchez-Iborra, R., G. Liaño, I., Simoes, C., Couñago, E., & Skarmeta, A. (2018). Tracking and Monitoring System Based on LoRa Technology for Lightweight Boats. Electronics, 8(1), 15. doi:10.3390/electronics8010015Sayed, A. H., Tarighat, A., & Khajehnouri, N. (2005). Network-based wireless location: challenges faced in developing techniques for accurate wireless location information. IEEE Signal Processing Magazine, 22(4), 24-40. doi:10.1109/msp.2005.1458275Maşazade, E., Ruixin Niu, Varshney, P. K., & Keskinoz, M. (2010). Energy Aware Iterative Source Localization for Wireless Sensor Networks. IEEE Transactions on Signal Processing, 58(9), 4824-4835. doi:10.1109/tsp.2010.2051433Yang, X., Kong, Q., & Xie, X. (2009). One-Dimensional Localization Algorithm Based on Signal Strength Ratio. International Journal of Distributed Sensor Networks, 5(1), 79-79. doi:10.1080/15501320802571822Xie, S., Wang, T., Hao, X., Yang, M., Zhu, Y., & Li, Y. (2019). Localization and Frequency Identification of Large-Range Wide-Band Electromagnetic Interference Sources in Electromagnetic Imaging System. Electronics, 8(5), 499. doi:10.3390/electronics8050499Zhu, X., Wu, X., & Chen, G. (2013). Relative localization for wireless sensor networks with linear topology. Computer Communications, 36(15-16), 1581-1591. doi:10.1016/j.comcom.2013.07.007Meng, W., Xiao, W., & Xie, L. (2011). An Efficient EM Algorithm for Energy-Based Multisource Localization in Wireless Sensor Networks. IEEE Transactions on Instrumentation and Measurement, 60(3), 1017-1027. doi:10.1109/tim.2010.2047035Lim, H., & Hou, J. C. (2009). Distributed localization for anisotropic sensor networks. ACM Transactions on Sensor Networks, 5(2), 1-26. doi:10.1145/1498915.1498917Xiaohong Sheng, & Yu-Hen Hu. (2005). Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks. IEEE Transactions on Signal Processing, 53(1), 44-53. doi:10.1109/tsp.2004.838930Yun Wang, Xiaodong Wang, Demin Wang, & Agrawal, D. P. (2009). Range-Free Localization Using Expected Hop Progress in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 20(10), 1540-1552. doi:10.1109/tpds.2008.239Huang, H., & Zheng, Y. R. (2018). Node localization with AoA assistance in multi-hop underwater sensor networks. Ad Hoc Networks, 78, 32-41. doi:10.1016/j.adhoc.2018.05.005Zàruba, G. V., Huber, M., Kamangar, F. A., & Chlamtac, I. (2006). Indoor location tracking using RSSI readings from a single Wi-Fi access point. Wireless Networks, 13(2), 221-235. doi:10.1007/s11276-006-5064-1Singh, M., & Khilar, P. M. (2015). An analytical geometric range free localization scheme based on mobile beacon points in wireless sensor network. Wireless Networks, 22(8), 2537-2550. doi:10.1007/s11276-015-1116-8Yiqiang Chen, Qiang Yang, Jie Yin, & Xiaoyong Chai. (2006). Power-efficient access-point selection for indoor location estimation. IEEE Transactions on Knowledge and Data Engineering, 18(7), 877-888. doi:10.1109/tkde.2006.112Alzoubi, K., Li, X.-Y., Wang, Y., Wan, P.-J., & Frieder, O. (2003). Geometric spanners for wireless ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 14(4), 408-421. doi:10.1109/tpds.2003.1195412Safa, H. (2014). A novel localization algorithm for large scale wireless sensor networks. Computer Communications, 45, 32-46. doi:10.1016/j.comcom.2014.03.020Kaemarungsi, K., & Krishnamurthy, P. (2012). Analysis of WLAN’s received signal strength indication for indoor location fingerprinting. Pervasive and Mobile Computing, 8(2), 292-316. doi:10.1016/j.pmcj.2011.09.003Patwari, N., Hero, A. O., Perkins, M., Correal, N. S., & O’Dea, R. J. (2003). Relative location estimation in wireless sensor networks. IEEE Transactions on Signal Processing, 51(8), 2137-2148. doi:10.1109/tsp.2003.814469Niculescu, D. (2003). Telecommunication Systems, 22(1/4), 267-280. doi:10.1023/a:1023403323460Mahyar, H., Hasheminezhad, R., Ghalebi K., E., Nazemian, A., Grosu, R., Movaghar, A., & Rabiee, H. R. (2018). Compressive sensing of high betweenness centrality nodes in networks. Physica A: Statistical Mechanics and its Applications, 497, 166-184. doi:10.1016/j.physa.2017.12.145Plets, D., Bastiaens, S., Martens, L., & Joseph, W. (2019). An Analysis of the Impact of LED Tilt on Visible Light Positioning Accuracy. Electronics, 8(4), 389. doi:10.3390/electronics8040389RSSI Datasethttps://github.com/pspachos/RSSI-DatasetAhmad, T., Li, X. J., & Seet, B.-C. (2019). Noise Reduction Scheme for Parametric Loop Division 3D Wireless Localization Algorithm Based on Extended Kalman Filtering. Journal of Sensor and Actuator Networks, 8(2), 24. doi:10.3390/jsan8020024Benson, S. J., Ye, Y., & Zhang, X. (2000). Solving Large-Scale Sparse Semidefinite Programs for Combinatorial Optimization. SIAM Journal on Optimization, 10(2), 443-461. doi:10.1137/s105262349732800

    Coverage Protocols for Wireless Sensor Networks: Review and Future Directions

    Full text link
    The coverage problem in wireless sensor networks (WSNs) can be generally defined as a measure of how effectively a network field is monitored by its sensor nodes. This problem has attracted a lot of interest over the years and as a result, many coverage protocols were proposed. In this survey, we first propose a taxonomy for classifying coverage protocols in WSNs. Then, we classify the coverage protocols into three categories (i.e. coverage aware deployment protocols, sleep scheduling protocols for flat networks, and cluster-based sleep scheduling protocols) based on the network stage where the coverage is optimized. For each category, relevant protocols are thoroughly reviewed and classified based on the adopted coverage techniques. Finally, we discuss open issues (and recommend future directions to resolve them) associated with the design of realistic coverage protocols. Issues such as realistic sensing models, realistic energy consumption models, realistic connectivity models and sensor localization are covered

    Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

    Get PDF
    Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource utilization and prolong the lifespan of the network. In this paper, we present an extensive literature review over the period 2002-2013 of machine learning methods that were used to address common issues in wireless sensor networks (WSNs). The advantages and disadvantages of each proposed algorithm are evaluated against the corresponding problem. We also provide a comparative guide to aid WSN designers in developing suitable machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial

    AWARE: Platform for Autonomous self-deploying and operation of Wireless sensor-actuator networks cooperating with unmanned AeRial vehiclEs

    Get PDF
    This paper presents the AWARE platform that seeks to enable the cooperation of autonomous aerial vehicles with ground wireless sensor-actuator networks comprising both static and mobile nodes carried by vehicles or people. Particularly, the paper presents the middleware, the wireless sensor network, the node deployment by means of an autonomous helicopter, and the surveillance and tracking functionalities of the platform. Furthermore, the paper presents the first general experiments of the AWARE project that took place in March 2007 with the assistance of the Seville fire brigades

    A QoS-Aware Routing Protocol for Real-time Applications in Wireless Sensor Networks

    Get PDF
    The paper presents a quality of service aware routing protocol which provides low latency for high priority packets. Packets are differentiated based on their priority by applying queuing theory. Low priority packets are transferred through less energy paths. The sensor nodes interact with the pivot nodes which in turn communicate with the sink node. This protocol can be applied in monitoring context aware physical environments for critical applications.Comment: 10 pages. arXiv admin note: text overlap with arXiv:1001.5339 by other author

    Distance Aware Relaying Energy-efficient: DARE to Monitor Patients in Multi-hop Body Area Sensor Networks

    Full text link
    In recent years, interests in the applications of Wireless Body Area Sensor Network (WBASN) is noticeably developed. WBASN is playing a significant role to get the real time and precise data with reduced level of energy consumption. It comprises of tiny, lightweight and energy restricted sensors, placed in/on the human body, to monitor any ambiguity in body organs and measure various biomedical parameters. In this study, a protocol named Distance Aware Relaying Energy-efficient (DARE) to monitor patients in multi-hop Body Area Sensor Networks (BASNs) is proposed. The protocol operates by investigating the ward of a hospital comprising of eight patients, under different topologies by positioning the sink at different locations or making it static or mobile. Seven sensors are attached to each patient, measuring different parameters of Electrocardiogram (ECG), pulse rate, heart rate, temperature level, glucose level, toxins level and motion. To reduce the energy consumption, these sensors communicate with the sink via an on-body relay, affixed on the chest of each patient. The body relay possesses higher energy resources as compared to the body sensors as, they perform aggregation and relaying of data to the sink node. A comparison is also conducted conducted with another protocol of BAN named, Mobility-supporting Adaptive Threshold-based Thermal-aware Energy-efficient Multi-hop ProTocol (M-ATTEMPT). The simulation results show that, the proposed protocol achieves increased network lifetime and efficiently reduces the energy consumption, in relative to M-ATTEMPT protocol.Comment: IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, Franc
    • …
    corecore