8,046 research outputs found
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Distributed Weight Selection in Consensus Protocols by Schatten Norm Minimization
In average consensus protocols, nodes in a network perform an iterative
weighted average of their estimates and those of their neighbors. The protocol
converges to the average of initial estimates of all nodes found in the
network. The speed of convergence of average consensus protocols depends on the
weights selected on links (to neighbors). We address in this paper how to
select the weights in a given network in order to have a fast speed of
convergence for these protocols. We approximate the problem of optimal weight
selection by the minimization of the Schatten p-norm of a matrix with some
constraints related to the connectivity of the underlying network. We then
provide a totally distributed gradient method to solve the Schatten norm
optimization problem. By tuning the parameter p in our proposed minimization,
we can simply trade-off the quality of the solution (i.e. the speed of
convergence) for communication/computation requirements (in terms of number of
messages exchanged and volume of data processed). Simulation results show that
our approach provides very good performance already for values of p that only
needs limited information exchange. The weight optimization iterative procedure
can also run in parallel with the consensus protocol and form a joint
consensus-optimization procedure.Comment: N° RR-8078 (2012
- …