754 research outputs found

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    Data Collection Protocols in Wireless Sensor Networks

    Get PDF
    In recent years, wireless sensor networks have became the effective solutions for a wide range of IoT applications. The major task of this network is data collection, which is the process of sensing the environment, collecting relevant data, and sending them to the server or BS. In this chapter, classification of data collection protocols are presented with the help of different parameters such as network lifetime, energy, fault tolerance, and latency. To achieve these parameters, different techniques such as multi-hop, clustering, duty cycling, network coding, aggregation, sink mobility, directional antennas, and cross-layer solutions have been analyzed. The drawbacks of these techniques are discussed. Finally, the future work for routing protocols in wireless sensor networks is discussed

    On Combining Duty-cycling with Network Coding in Flood-based Sensor Networks

    Get PDF
    Network coding and duty-cycling are two popular techniques for saving energy in wireless sensor networks. To the best of our knowledge, the idea to combine these two techniques, for even more aggressive energy savings, has not been explored. One explanation is that these two techniques achieve energy efficiency through conflicting means, e.g., network coding saves energy by exploiting overhearing, whereas dutycycling saves energy by cutting idle listening and, thus, overhearing. In this thesis, we thoroughly evaluate the use of network coding in duty-cycled sensor networks. We propose a scheme called DutyCode, in which a MAC protocol implements packet streaming and allows the application to decide when a node can sleep. Additionally, a novel, efficient coding scheme decision algorithm, ECSDT, assists DutyCode to reduce further energy consumption by minimizing redundant packet transmissions, while an adaptive mode switching algorithm allows smooth and timely transition between DutyCode and the default MAC protocol, without any packet loss. We investigate our solution analytically, implement it on mote hardware, and evaluate it in a 42-node indoor testbed. Performance evaluation results show that our scheme saves 30-46% more energy than solutions that use network coding, without using duty-cycling

    Kablosuz sensör ağlarinda yönlü antenlerle enerji̇ veri̇mli̇ yönlendi̇rme

    Get PDF
    Without measurements, sustainable development effort can not progress in the right direction. Wireless sensor networks are vital for monitoring in real time and making accurate measurements for such an endeavor. However small energy storage in the sensors can become a bottleneck if the wireless sensor network is not optimized at the hardware and software level. Directional antennas are such optimization technologies at the hardware level. They have advantages over the omnidirectional antennas, such as high gain, less interference, longer transmission range, and less power consumption. In wireless sensor networks, most of the energy is consumed for communication. Considering the limited energy in small scale batteries of the sensors, energy efficient (aware) routing, is one of the most important software optimization techniques. The main goal of the technique is to improve the lifetime of the wireless sensor networks. In the light of these observations, it is desirable to do a coupled design of directional antennas with network software, for fully exploiting the advantages offered by directional antenna technology. In this thesis, the possibilities of doing such integrated design are surveyed and improvements are suggested. The design of the proposed microstrip patch antenna array is discussed and the performance characteristics are assessed through simulations. In the benchmarks, the proposed routing method showed improvements in energy usage compared to the existing approaches.Ölçümler olmadan sürdürülebilir kalkınma çabaları doğru yönde ilerleyemez. Bu tür çabalar için, kablosuz sensör ağları, gerçek zamanlı olarak izleme ve kesin ölçümler yapmak için vazgeçilemez unsurdur. Ancak, sensör ağı, donanım ve yazılım düzeylerinde optimize edilmemişse, sensörlerde enerji yetersizliği görülebilinir. Yönlü antenler, donanım düzeyinde uygulanan optimizasyon teknolojilerinden biri olmakla birlikte, çok yönlü antenlerden farklı olarak, yüksek kazanç, daha az parazit, daha uzun iletim mesafesi ve daha az güç tüketimi sağlarlar. Kablosuz sensör ağlarında enerjinin çoğu iletişim için tüketilir. Sensörlerdeki limitli enerjili küçük ölçekli piller göz önüne alındığında, yazılım düzeyindeki önemli metodlardan biri olan enerji verimli (duyarlı) yönlendirme protokolü, kablosuz sensör ağının genel enerji kullanımını optimize etmek ve ömrünü uzatmak için gereklidir. Bu gözlemlerin ışığında, yönlü anten teknolojisinin sunduğu potansiyel avantajlardan tam olarak yararlanmak için, yönlü antenlerin ağ yazılımıyla birlikte entegre tasarımını yapmak arzu edilir. Bu tezde, böyle bir entegre tasarımın yapılma olasılıkları araştırılmış ve iyileştirmeler önerilmiştir. Tezde, küçük şeritli yamalı anten dizisinin tasarımı tartışılmış ve performans karakteristikleri simulasyonlarla ölçülmüştür. Önerilen yönlendirme algoritması, diğer yönlendirme algoritmaları ile karşılaştırıldığında, enerji kullanımında iyileştirmeler göstermiştirM.S. - Master of Scienc

    Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Get PDF
    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.https://doi.org/10.3390/s14030507

    Constructive Interference in 802.15.4: A Tutorial

    Get PDF
    International audienceConstructive Interference (CI) can happen when multiple wireless devices send the same frame at the same time. If the time offset between the transmissions is less than 500 ns, a receiver will successfully decode the frame with high probability. CI can be useful for achieving low-latency communication or low-overhead flooding in a multi-hop low-power wireless network. The contribution of this article is threefold. First, we present the current state-of-the-art CI-based protocols. Second, we provide a detailed hands-on tutorial on how to implement CI-based protocols on TelosB motes, with well documented open-source code. Third, we discuss the issues and challenges of CI-based protocols, and list open issues and research directions. This article is targeted at the level of practicing engineers and advanced researchers and can serve both as a primer on CI technology and a reference to its implementation

    Cross-layer energy optimisation of routing protocols in wireless sensor networks

    Get PDF
    Recent technological developments in embedded systems have led to the emergence of a new class of networks, known asWireless Sensor Networks (WSNs), where individual nodes cooperate wirelessly with each other with the goal of sensing and interacting with the environment.Many routing protocols have been developed tomeet the unique and challenging characteristics of WSNs (notably very limited power resources to sustain an expected lifetime of perhaps years, and the restricted computation, storage and communication capabilities of nodes that are nonetheless required to support large networks and diverse applications). No standards for routing have been developed yet for WSNs, nor has any protocol gained a dominant position among the research community. Routing has a significant influence on the overall WSN lifetime, and providing an energy efficient routing protocol remains an open problem. This thesis addresses the issue of designing WSN routing methods that feature energy efficiency. A common time reference across nodes is required in mostWSN applications. It is needed, for example, to time-stamp sensor samples and for duty cycling of nodes. Alsomany routing protocols require that nodes communicate according to some predefined schedule. However, independent distribution of the time information, without considering the routing algorithm schedule or network topology may lead to a failure of the synchronisation protocol. This was confirmed empirically, and was shown to result in loss of connectivity. This can be avoided by integrating the synchronisation service into the network layer with a so-called cross-layer approach. This approach introduces interactions between the layers of a conventional layered network stack, so that the routing layer may share information with other layers. I explore whether energy efficiency can be enhanced through the use of cross-layer optimisations and present three novel cross-layer routing algorithms. The first protocol, designed for hierarchical, cluster based networks and called CLEAR (Cross Layer Efficient Architecture for Routing), uses the routing algorithm to distribute time information which can be used for efficient duty cycling of nodes. The second method - called RISS (Routing Integrated Synchronization Service) - integrates time synchronization into the network layer and is designed to work well in flat, non-hierarchical network topologies. The third method - called SCALE (Smart Clustering Adapted LEACH) - addresses the influence of the intra-cluster topology on the energy dissipation of nodes. I also investigate the impact of the hop distance on network lifetime and propose a method of determining the optimal location of the relay node (the node through which data is routed in a two-hop network). I also address the problem of predicting the transition region (the zone separating the region where all packets can be received and that where no data can be received) and I describe a way of preventing the forwarding of packets through relays belonging in this transition region. I implemented and tested the performance of these solutions in simulations and also deployed these routing techniques on sensor nodes using TinyOS. I compared the average power consumption of the nodes and the precision of time synchronization with the corresponding parameters of a number of existing algorithms. All proposed schemes extend the network lifetime and due to their lightweight architecture they are very efficient on WSN nodes with constrained resources. Hence it is recommended that a cross-layer approach should be a feature of any routing algorithm for WSNs
    corecore