16,029 research outputs found
An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks
Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful
energy awareness is essential when working with these devices.
Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features.
This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols.
The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and
has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference
publications in IEEE Explore and one workshop paper
Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks
Future wireless networks have a substantial potential in terms of supporting
a broad range of complex compelling applications both in military and civilian
fields, where the users are able to enjoy high-rate, low-latency, low-cost and
reliable information services. Achieving this ambitious goal requires new radio
techniques for adaptive learning and intelligent decision making because of the
complex heterogeneous nature of the network structures and wireless services.
Machine learning (ML) algorithms have great success in supporting big data
analytics, efficient parameter estimation and interactive decision making.
Hence, in this article, we review the thirty-year history of ML by elaborating
on supervised learning, unsupervised learning, reinforcement learning and deep
learning. Furthermore, we investigate their employment in the compelling
applications of wireless networks, including heterogeneous networks (HetNets),
cognitive radios (CR), Internet of things (IoT), machine to machine networks
(M2M), and so on. This article aims for assisting the readers in clarifying the
motivation and methodology of the various ML algorithms, so as to invoke them
for hitherto unexplored services as well as scenarios of future wireless
networks.Comment: 46 pages, 22 fig
Recommended from our members
Q-learning-based dynamic spectrum access in cognitive Industrial Internet of Things
In recent years, Industrial Internet of Things (IIoT) has attracted growing attention from both academia and industry. Meanwhile, when traditional wireless sensor networks are applied to complex industrial field with high requirements for real time and robustness, how to design an efficient and practical cross-layer transmission mechanism needs to be fully investigated. In this paper, we propose a Q-learning-based dynamic spectrum access method for IIoT by introducing cognitive self-learning technical solution to solve the difficulty of distributed and ordered self-accessing for unlicensed terminals. We first devise a simplified MAC access protocol for unlicensed users to use single available channel. Then, a Q-learning-based multi-channels access scheme is raised for the unlicensed users migrating to other lower cells. The channel with most Q value will be considered to be selected. Every mobile terminals store and update their own channel lists due to distributed network mode and non-perfect sensing ability. Numerical results are provided to evaluate the performances of our proposed method on dynamic spectrum access in IIoT. Our proposed method outperforms the traditional simplified accessing methods without self-learning capability on channel usage rate and conflict probability
Energy-aware routing protocols in wireless sensor networks
Saving energy and increasing network lifetime are significant challenges in
the field of Wireless Sensor Networks (WSNs). Energy-aware routing protocols
have been introduced for WSNs to overcome limitations of WSN including limited
power resources and difficulties renewing or recharging sensor nodes batteries.
Furthermore, the potentially inhospitable environments of sensor locations, in some
applications, such as the bottom of the ocean, or inside tornados also have to be
considered. ZigBee is one of the latest communication standards designed for
WSNs based on the IEEE 802.15.4 standard. The ZigBee standard supports two
routing protocols, the Ad hoc On-demand Distance Vector (AODV), and the
cluster-tree routing protocols. These protocols are implemented to establish the
network, form clusters, and transfer data between the nodes. The AODV and the
cluster-tree routing protocols are two of the most efficient routing protocols in terms
of reducing the control message overhead, reducing the bandwidth usage in the
network, and reducing the power consumption of wireless sensor nodes compared to
other routing protocols. However, neither of these protocols considers the energy
level or the energy consumption rate of the wireless sensor nodes during the
establishment or routing processes. (Continues...)
Recommended from our members
Ubiquitous Internet in an integrated satellite-terrestrial environment: The SUITED solution
yesThe current Internet architecture appears to
not be particularly suited to addressing the
emerging needs of new classes of users who wish
to gain access to multimedia services made available
by ISPs, regardless of their location, while
in motion and with a guaranteed level of quality.
One of the main objectives of so-called nextgeneration
systems is to overcome the limitations
of todayÂżs available Internet by adopting an
approach based on the integration of different
mobile and fixed networks. The SUITED project
moves in this direction since it aims at contributing
to the design and deployment of the global
mobile broadband system (GMBS), a unique
satellite/terrestrial infrastructure ensuring
nomadic users access to Internet services with a
negotiated QoS. A description of the main features
of the GMBS architecture, characterized
by the integration of a multisegment access network
with a federated ISP network is given in
this article. The GMBS multimode terminal is
schematically described, and an overview of the
so-called QoS-aware mobility management
scheme, devised for such a heterogeneous scenario,is provided
Final report on the evaluation of RRM/CRRM algorithms
Deliverable public del projecte EVERESTThis deliverable provides a definition and a complete evaluation of the RRM/CRRM algorithms selected in D11 and D15, and evolved and refined on an iterative process. The evaluation will be carried out by means of simulations using the simulators provided at D07, and D14.Preprin
- …