1,505 research outputs found

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks

    Get PDF
    Data dissemination is the most significant task in a Wireless Sensor Network (WSN). From the bootstrapping stage to the full functioning stage, a WSN must disseminate data in various patterns like from the sink to node, from node to sink, from node to node, or the like. This is what a WSN is deployed for. Hence, this issue comes with various data routing models and often there are different types of network settings that influence the way of data collection and/or distribution. Considering the importance of this issue, in this paper, we present a survey on various prominent data dissemination techniques in such network. Our classification of the existing works is based on two main parameters: the number of sink (single or multiple) and the nature of its movement (static or mobile). Under these categories, we have analyzed various previous works for their relative strengths and weaknesses. A comparison is also made based on the operational methods of various data dissemination schemes

    Geographic gossip: efficient aggregation for sensor networks

    Get PDF

    Analyzing the Impact of Wireless Multi-Hop Networking On Vehicular Safety

    Get PDF
    One of the core challenges of Intelligent Transportation System is the dissemination of timely and accurate vehicle information (e.g. speed, position) to geographically large distances without compromising data supply rates from immediate neighbors. This feature is critical for the design of vehicle safety and navigation applications. Single hop broadcasting is often inadequate to ensure vehicle safety when the platoon size is arbitrarily large due to its upper bound on rate and range of wireless message transmission. Existing wireless multi-hop protocols do not ensure reliable message delivery while avoiding network congestion in the shared channel. In this thesis, we make two separate but related investigations to address this challenge - (1) Analyze the impact of distance sensitive multi-hop broadcasting in realistic traffic network (2) Analyze the impact of wireless multi-hop network in vehicle safety. For investigating the first part, we used VCAST, a distance sensitive information propagation technique, in which information is forwarded at a rate that decreases linearly with distance from the source. VCAST is evaluated by using extensive simulations in ns-3, a discrete event simulator for wireless and mobile ad-hoc networks, under different density, source broadcast rates and communication range. To simulate realistic traffic movement, we used 2d grids of different sizes and used both uniform and non-uniform mobility. The results show that VCAST is scalable for - large number of vehicles and large source broadcast rates. It is further shown that successful scaling is achieved by reduced number of vehicle records transmitted per second per vehicle for varying network sizes and varying source broadcast rates. Vehicle safety messages for VCAST are piggy backed on heart beat messages and does not require any modifications to the existing vehicular communication standards. For investigating the second part, we implemented a realistic car following model and used string stability analysis as a metric for measuring vehicle safety. The basic idea is to exploit the small network propagation time in disseminating safety messages over large distances, instead of relying on just the predecessor vehicle\u27s state. This enables distant vehicles in a traffic stream to plan well in advance against rear end collisions which could lead to string instability. We also proposed one such proactive method of planning - and that is by controlling the headway time. Through extensive simulations, we obtained results for vehicle safety when some incident is detected abruptly on its course. The results show that proactive planning using multi-hop network makes the entire platoon string stable in the presence of emergency road incidents
    • …
    corecore