97 research outputs found

    Special issue on “Modeling and Performance Evaluation of Wireless Ad-Hoc Networks”

    Get PDF
    A primary aim of wireless ad-hoc networks is to deliver data in areas where there is no pre-defined infrastructure. In these networks, the users, but also the network entities can be potentially mobile. Wireless ad-hoc networks have recently witnessed their fastest growth period ever in history. Real wireless ad-hoc networks are now implemented, deployed and tested, and this trend is likely to increase in the future. However, as such networks are increasingly complex, performance modeling and evaluation play a crucial part in their design process to ensure their successful deployment and exploitation in practice. This special issue on Modeling and Performance Evaluation of Wireless Ad-Hoc Networks aims to open a new critical debate on the evaluation of wireless ad-hoc networks. It includes original theoretical and/or practical contributions, from researchers and practitioners that identify and address issues in evaluating wireless ad-hoc networks.Peer ReviewedPostprint (author's final draft

    Concepts and evolution of research in the field of wireless sensor networks

    Full text link
    The field of Wireless Sensor Networks (WSNs) is experiencing a resurgence of interest and a continuous evolution in the scientific and industrial community. The use of this particular type of ad hoc network is becoming increasingly important in many contexts, regardless of geographical position and so, according to a set of possible application. WSNs offer interesting low cost and easily deployable solutions to perform a remote real time monitoring, target tracking and recognition of physical phenomenon. The uses of these sensors organized into a network continue to reveal a set of research questions according to particularities target applications. Despite difficulties introduced by sensor resources constraints, research contributions in this field are growing day by day. In this paper, we present a comprehensive review of most recent literature of WSNs and outline open research issues in this field

    Cognitive Security Framework For Heterogeneous Sensor Network Using Swarm Intelligence

    Get PDF
    Rapid development of sensor technology has led to applications ranging from academic to military in a short time span. These tiny sensors are deployed in environments where security for data or hardware cannot be guaranteed. Due to resource constraints, traditional security schemes cannot be directly applied. Unfortunately, due to minimal or no communication security schemes, the data, link and the sensor node can be easily tampered by intruder attacks. This dissertation presents a security framework applied to a sensor network that can be managed by a cohesive sensor manager. A simple framework that can support security based on situation assessment is best suited for chaotic and harsh environments. The objective of this research is designing an evolutionary algorithm with controllable parameters to solve existing and new security threats in a heterogeneous communication network. An in-depth analysis of the different threats and the security measures applied considering the resource constrained network is explored. Any framework works best, if the correlated or orthogonal performance parameters are carefully considered based on system goals and functions. Hence, a trade-off between the different performance parameters based on weights from partially ordered sets is applied to satisfy application specific requirements and security measures. The proposed novel framework controls heterogeneous sensor network requirements,and balance the resources optimally and efficiently while communicating securely using a multi-objection function. In addition, the framework can measure the affect of single or combined denial of service attacks and also predict new attacks under both cooperative and non-cooperative sensor nodes. The cognitive intuition of the framework is evaluated under different simulated real time scenarios such as Health-care monitoring, Emergency Responder, VANET, Biometric security access system, and Battlefield monitoring. The proposed three-tiered Cognitive Security Framework is capable of performing situation assessment and performs the appropriate security measures to maintain reliability and security of the system. The first tier of the proposed framework, a crosslayer cognitive security protocol defends the communication link between nodes during denial-of-Service attacks by re-routing data through secure nodes. The cognitive nature of the protocol balances resources and security making optimal decisions to obtain reachable and reliable solutions. The versatility and robustness of the protocol is justified by the results obtained in simulating health-care and emergency responder applications under Sybil and Wormhole attacks. The protocol considers metrics from each layer of the network model to obtain an optimal and feasible resource efficient solution. In the second tier, the emergent behavior of the protocol is further extended to mine information from the nodes to defend the network against denial-of-service attack using Bayesian models. The jammer attack is considered the most vulnerable attack, and therefore simulated vehicular ad-hoc network is experimented with varied types of jammer. Classification of the jammer under various attack scenarios is formulated to predict the genuineness of the attacks on the sensor nodes using receiver operating characteristics. In addition to detecting the jammer attack, a simple technique of locating the jammer under cooperative nodes is implemented. This feature enables the network in isolating the jammer or the reputation of node is affected, thus removing the malicious node from participating in future routes. Finally, a intrusion detection system using `bait\u27 architecture is analyzed where resources is traded-off for the sake of security due to sensitivity of the application. The architecture strategically enables ant agents to detect and track the intruders threateningthe network. The proposed framework is evaluated based on accuracy and speed of intrusion detection before the network is compromised. This process of detecting the intrusion earlier helps learn future attacks, but also serves as a defense countermeasure. The simulated scenarios of this dissertation show that Cognitive Security Framework isbest suited for both homogeneous and heterogeneous sensor networks

    On the performance of adaptive coding schemes for energy efficient and reliable clustered wireless sensor networks

    Get PDF
    Clustering is the key for energy constrained wireless sensor networks (WSNs). Energy optimization and communication reliability are the most important consideration in designing efficient clustered WSN. In lossy environment, channel coding is mandatory to ensure reliable and efficient communication. This reliability is compromised by additional energy of coding and decoding in cluster heads. In this paper, we investigated the trade-offbetween reliability and energy efficiency and proposed adaptive FEC/FWD and FEC/ARQ coding frameworks for clustered WSNs. The proposed schemes consider channel condition and inter-node distance to decide the adequate channel coding usage. Simulation results show that both the proposed frameworks are energy efficient compared to ARQ schemes and FEC schemes, and suitable to prolong the clustered network lifespan as well as improve the reliability

    Self-Derived Wavelet Compression and Self Matching Reconstruction Algorithm for Environmental Data in Complex Space of Coal Mine Roadway

    Get PDF
    A crucial assurance for coal mine safety production, prevention and control, and rescue, which is the fundamental tenet of implementing intelligent coal mining, is the safety, stability, and quick transmission of coal mine roadways. However, because of the complex structure of the roadway environment, such as limited and variable space and numerous pieces of equipment, the wireless communication network is affected by the environment, the data transmission channel characteristics are complex and variable, and the existing data transmission methods are weak in adapting to the changing channel. These factors result in poor stability of the transmission of coal mine roadway environment detection data in the wireless communicative network. As a result, this article investigates the wireless communication systems’ real-time transmission in the intricate environmental setting of a coal mine. Based on the application of multiscale wavelet theory in data compression and reconstruction, an adaptive multiscale wavelet compression model based on the wireless data transmission channel is proposed, with an improved Huffman data compression coding algorithm derived from the multiscale wavelet, so that the environmental data meet the wireless communication channel transmission capability. The proposed algorithm boosts the compression ratio and adaptability of environmental data. A self-matching wavelet reconstruction algorithm is developed to achieve real-time and accurate data reconstruction following self-driven wavelet decomposition. The compression and reconstruction experiment performed during real-time wireless transmission of gas concentration data reveals that the original signal’s compression ratio reaches 74% with minor error and high fidelity. The algorithm provides the theoretical foundation for compression and reconstruction in complex coal mine environments for accurate, stable, and real-time data transmission. It is critical for ensuring reliable data transmission in safe production, prevention and control, rescue, and other operations, and it provides theoretical and technical support for intelligent coal mining

    Compilation of thesis abstracts, March 2009

    Get PDF
    NPS Class of March 2009This quarter’s Compilation of Abstracts summarizes cutting-edge, security-related research conducted by NPS students and presented as theses, dissertations, and capstone reports. Each expands knowledge in its field.http://archive.org/details/compilationofsis109452751

    Challenges and Solutions for Intrusion Detection in Wireless Mesh Networks

    Get PDF
    The problem of intrusion detection in wireless mesh networks (WMN) is challenging, primarily because of lack of single vantage points where traffic can be analyzed and the limited resources available to participating nodes. Although the problem has received some attention from the research community, little is known about the tradeoffs among different objectives, such as high network performance, low energy consumption, and high security effectiveness. In this research, we show how accurate intrusion detection can be achieved in such resource constrained environments. The major challenges that hinder the performance of intrusion detection systems (IDS) in WMN are resources (e.g., energy, processing, and storage capabilities) accompanied by the adhoc-dynamic communication flows. In light of these challenges, we classify the proposed solutions into four classes: 1) Resourceless Traffic Aware (RL-TW) IDS, 2) Resourceless Traffic Agnostic (RLTG) IDS, 3) Resourceful Traffic Agnostic (RF-TG) IDS, and 4) Resourceful Traffic Aware (RF-TW) IDS. To achieve a desirable level of intrusion detection in WMN, we propose a research program encompassing five thrusts. First we show how traffic-awareness helps IDS solutions achieving high detection rates in resource-constrained WMN. Next, we propose two RL-TG (i.e., cooperative and non-cooperative) IDS solutions that can optimally monitor the entire WMN traffic without relying on WMN traffic information. The third (RF-TG) and fourth (RF-TW) IDS solutions propose energy-efficient monitoring mechanisms for intrusion detection in battery-powered WMN for traffic-agnostic and traffic-aware scenarios, respectively. We then investigate the Attack and Fault Tolerance of our proposed solutions and finally enumerate potential improvements and future works for our proposed solutions

    Smart Wireless Sensor Networks

    Get PDF
    The recent development of communication and sensor technology results in the growth of a new attractive and challenging area - wireless sensor networks (WSNs). A wireless sensor network which consists of a large number of sensor nodes is deployed in environmental fields to serve various applications. Facilitated with the ability of wireless communication and intelligent computation, these nodes become smart sensors which do not only perceive ambient physical parameters but also be able to process information, cooperate with each other and self-organize into the network. These new features assist the sensor nodes as well as the network to operate more efficiently in terms of both data acquisition and energy consumption. Special purposes of the applications require design and operation of WSNs different from conventional networks such as the internet. The network design must take into account of the objectives of specific applications. The nature of deployed environment must be considered. The limited of sensor nodesďż˝ resources such as memory, computational ability, communication bandwidth and energy source are the challenges in network design. A smart wireless sensor network must be able to deal with these constraints as well as to guarantee the connectivity, coverage, reliability and security of network's operation for a maximized lifetime. This book discusses various aspects of designing such smart wireless sensor networks. Main topics includes: design methodologies, network protocols and algorithms, quality of service management, coverage optimization, time synchronization and security techniques for sensor networks

    Air Force Institute of Technology Research Report 2004

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, and Engineering Physics

    Air Force Institute of Technology Research Report 2007

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, Mathematics, Statistics and Engineering Physics
    • …
    corecore