213 research outputs found

    Energy-aware distributed routing algorithm to tolerate network failure in wireless sensor networks

    Get PDF
    Wireless Sensor Networks are prone to link/node failures due to various environmental hazards such as interference and internal faults in deployed sensor nodes. Such failures can result in a disconnection in part of the network and the sensed data being unable to obtain a route to the sink(s), i.e. a network failure. Network failures potentially degrade the Quality of Service (QoS) of Wireless Sensor Networks (WSNs). It is very difficult to monitor network failures using a manual operator in a harsh or hostile environment. In such environments, communication links can easy fail because of node unequal energy depletion and hardware failure or invasion. Thus it is desirable that deployed sensor nodes are capable of overcoming network failures. In this paper, we consider the problem of tolerating network failures seen by deployed sensor nodes in a WSN. We first propose a novel clustering algorithm for WSNs, termed Distributed Energy Efficient Heterogeneous Clustering (DEEHC) that selects cluster heads according to the residual energy of deployed sensor nodes with the aid of a secondary timer. During the clustering phase, each sensor node finds k-vertex disjoint paths to cluster heads depending on the energy level of its neighbor sensor nodes. We then present a k-Vertex Disjoint Path Routing (kVDPR) algorithm where each cluster head finds k-vertex disjoint paths to the base station and relays their aggregate data to the base station. Furthermore, we also propose a novel Route Maintenance Mechanism (RMM) that can repair k-vertex disjoint paths throughout the monitoring session. The resulting WSNs become tolerant to k-1 failures in the worst case. The proposed scheme has been extensively tested using various network scenarios and compared to the existing state of the art approaches to show the effectiveness of the proposed scheme

    Fast restoration of Connectivity for Wireless Sensor Networks

    Get PDF
    International audienceNode failures represent a fundamental problem in wireless sensor networks. Such failures may result in partitioned networks and lose of sensed information. A network recovery approach is thus necessary in order to ensure continuous network operations. In this paper, we propose CoMN2 a scalable and distributed approach for network recovery from node failures in wireless sensor networks. CoMN2 relies on a new concept called network mapping which consists in partitioning the network into several regions of increasing criticality. The criticality is set according to the energy, the traffic distribution and the deployment of nodes. Using this network mapping, our solution CoMN2 ensures the continuous network activity by efficiently swapping nodes from low critical area to highly critical area when required. Simulation results prove the effectiveness of our approach and show that the obtained improve-ment in terms of lifetime is in the order of 40%

    Cluster based jamming and countermeasures for wireless sensor network MAC protocols

    Get PDF
    A wireless sensor network (WSN) is a collection of wireless nodes, usually with limited computing resources and available energy. The medium access control layer (MAC layer) directly guides the radio hardware and manages access to the radio spectrum in controlled way. A top priority for a WSN MAC protocol is to conserve energy, however tailoring the algorithm for this purpose can create or expose a number of security vulnerabilities. In particular, a regular duty cycle makes a node vulnerable to periodic jamming attacks. This vulnerability limits the use of use of a WSN in applications requiring high levels of security. We present a new WSN MAC protocol, RSMAC (Random Sleep MAC) that is designed to provide resistance to periodic jamming attacks while maintaining elements that are essential to WSN functionality. CPU, memory and especially radio usage are kept to a minimum to conserve energy while maintaining an acceptable level of network performance so that applications can be run transparently on top of the secure MAC layer. We use a coordinated yet pseudo-random duty cycle that is loosely synchronized across the entire network via a distributed algorithm. This thwarts an attacker\u27s ability to predict when nodes will be awake and likewise thwarts energy efficient intelligent jamming attacks by reducing their effectiveness and energy-efficiency to that of non-intelligent attacks. Implementing the random duty cycle requires additional energy usage, but also offers an opportunity to reduce asymmetric energy use and eliminate energy use lost to explicit neighbor discovery. We perform testing of RSMAC against non-secure protocols in a novel simulator that we designed to make prototyping new WSN algorithms efficient, informative and consistent. First we perform tests of the existing SMAC protocol to demonstrate the relevance of the novel simulation for estimating energy usage, data transmission rates, MAC timing and other relevant macro characteristics of wireless sensor networks. Second, we use the simulation to perform detailed testing of RSMAC that demonstrates its performance characteristics with different configurations and its effectiveness in confounding intelligent jammers

    Enabling Hardware Green Internet of Things: A review of Substantial Issues

    Get PDF
    Between now and the near future, the Internet of Things (IoT) will redesign the socio-ecological morphology of the human terrain. The IoT ecosystem deploys diverse sensor platforms connecting millions of heterogeneous objects through the Internet. Irrespective of sensor functionality, most sensors are low energy consumption devices and are designed to transmit sporadically or continuously. However, when we consider the millions of connected sensors powering various user applications, their energy efficiency (EE) becomes a critical issue. Therefore, the importance of EE in IoT technology, as well as the development of EE solutions for sustainable IoT technology, cannot be overemphasised. Propelled by this need, EE proposals are expected to address the EE issues in the IoT context. Consequently, many developments continue to emerge, and the need to highlight them to provide clear insights to researchers on eco-sustainable and green IoT technologies becomes a crucial task. To pursue a clear vision of green IoT, this study aims to present the current state-of-the art insights into energy saving practices and strategies on green IoT. The major contribution of this study includes reviews and discussions of substantial issues in the enabling of hardware green IoT, such as green machine to machine, green wireless sensor networks, green radio frequency identification, green microcontroller units, integrated circuits and processors. This review will contribute significantly towards the future implementation of green and eco-sustainable IoT

    Wireless Sensor Network Virtualization: A Survey

    Get PDF
    Wireless Sensor Networks (WSNs) are the key components of the emerging Internet-of-Things (IoT) paradigm. They are now ubiquitous and used in a plurality of application domains. WSNs are still domain specific and usually deployed to support a specific application. However, as WSN nodes are becoming more and more powerful, it is getting more and more pertinent to research how multiple applications could share a very same WSN infrastructure. Virtualization is a technology that can potentially enable this sharing. This paper is a survey on WSN virtualization. It provides a comprehensive review of the state-of-the-art and an in-depth discussion of the research issues. We introduce the basics of WSN virtualization and motivate its pertinence with carefully selected scenarios. Existing works are presented in detail and critically evaluated using a set of requirements derived from the scenarios. The pertinent research projects are also reviewed. Several research issues are also discussed with hints on how they could be tackled.Comment: Accepted for publication on 3rd March 2015 in forthcoming issue of IEEE Communication Surveys and Tutorials. This version has NOT been proof-read and may have some some inconsistencies. Please refer to final version published in IEEE Xplor

    Fiabilisation des transmissions dans les réseaux de capteurs sans fils

    Get PDF
    Over the past decades, we have witnessed a proliferation of potential application domainsfor wireless sensor networks (WSN). A comprehensive number of new services such asenvironment monitoring, target tracking, military surveillance and healthcare applicationshave arisen. These networked sensors are usually deployed randomly and left unattendedto perform their mission properly and efficiently. Meanwhile, sensors have to operate ina constrained environment with functional and operational challenges mainly related toresource limitations (energy supply, scarce computational abilities...) and to the noisyreal world of deployment. This harsh environment can cause packet loss or node failurewhich hamper the network activity. Thus, continuous delivery of data requires reliabledata transmission and adaptability to the dynamic environment. Ensuring network reliabilityis consequently a key concern in WSNs and it is even more important in emergencyapplication such disaster management application where reliable data delivery is the keysuccess factor. The main objective of this thesis is to design a reliable end to end solution for data transmission fulfilling the requirements of the constrained WSNs. We tackle two design issues namely recovery from node failure and packet losses and propose solutions to enhance the network reliability. We start by studying WSNs features with a focus on technical challenges and techniques of reliability in order to identify the open issues. Based on this study, we propose a scalable and distributed approach for network recovery from nodefailures in WSNs called CoMN2. Then, we present a lightweight mechanism for packetloss recovery and route quality awareness in WSNs called AJIA. This protocol exploitsthe overhearing feature characterizing the wireless channels as an implicit acknowledgment(ACK) mechanism. In addition, the protocol allows for an adaptive selection of therouting path by achieving required retransmissions on the most reliable link. We provethat AJIA outperforms its competitor AODV in term of delivery ratio in different channelconditions. Thereafter, we present ARRP, a variant of AJIA, combining the strengthsof retransmissions, node collaboration and Forward Error Correction (FEC) in order toprovide a reliable packet loss recovery scheme. We verify the efficiency of ARRP throughextensive simulations which proved its high reliability in comparison to its competitor.Vu les perspectives qu'ils offrent, les réseaux de capteur sans fil (RCSF) ont perçu un grand engouement de la part de la communauté de recherche ces dernières années. Les RCSF couvrent une large gamme d'applications variant du contrôle d'environnement, le pistage de cible aux applications de santé. Les RCSFs sont souvent déployés aléatoirement. Ce dispersement des capteurs nécessite que les protocoles de transmission utilisés soient résistants aux conditions environnementales (fortes chaleurs ou pluies par exemple) et aux limitations de ressources des nœuds capteurs. En effet, la perte de plusieurs nœuds capteurs peut engendrer la perte de communication entre les différentes entités. Ces limitations peuvent causer la perte des paquets transmis ce qui entrave l'activité du réseau. Par conséquent, il est important d'assurer la fiabilité des transmissions de données dans les RCSF d'autant plus pour les applications critiques comme la détection d'incendies. Dans cette thèse, nous proposons une solution complète de transmission de données dans les RCSF répondant aux exigences et contraintes de ce type de réseau. Dans un premier temps, nous étudions les contraintes et les challenges liés à la fiabilisation des transmissions dans les RCSFs et nous examinons les travaux proposés dans la littérature. Suite à cette étude nous proposons COMN2, une approche distribuée et scalable permettant de faire face à la défaillance des nœuds. Ensuite, nous proposons un mécanisme de contrôle d'erreur minimisant la perte de paquets et proposant un routage adaptatif en fonction de la qualité du lien. Cette solution est basée sur des acquittements implicites (overhearing) pour la détection des pertes des paquets. Nous proposons ensuite ARRP une variante de AJIA combinant les avantages des retransmissions, de la collaboration des nœuds et des FEC. Enfin, nous simulons ces différentes solutions et vérifions leurs performances par rapport à leurs concurrents de l'état de l'art

    Evolving attackers against wireless sensor networks using genetic programming

    Get PDF
    Recent hardware developments have made it possible for the Internet of Things (IoT) to be built. A wide variety of industry sectors, including manufacturing, utilities, agriculture, transportation, and healthcare are actively seeking to incorporate IoT technologies in their operations. The increased connectivity and data sharing that give IoT systems their advantages also increase their vulnerability to attack. In this study, the authors explore the automated generation of attacks using genetic programming (GP), so that defences can be tested objectively in advance of deployment. In the authors' system, the GP-generated attackers targeted publish-subscribe communications within a wireless sensor networks that was protected by an artificial immune intrusion detection system (IDS) taken from the literature. The GP attackers successfully suppressed more legitimate messages than the hand-coded attack used originally to test the IDS, whilst reducing the likelihood of detection. Based on the results, it was possible to reconfigure the IDS to improve its performance. Whilst the experiments were focussed on establishing a proof-of-principle rather than a turnkey solution, they indicate that GP-generated attackers have the potential to improve the protection of systems with large attack surfaces, in a way that is complementary to traditional testing and certification

    Secure authentication and data aggregation scheme for routing packets in wireless sensor network

    Get PDF
    Wireless sensor networks (WSNs) comprise a huge number of sensors that sense real-time data; in general, WSNs are designed for monitoring in various application mainly internet of things based (IoT) application. Moreover, these sensors possess a certain amount of energy i.e., they are battery based; thus, the network model must be efficient. Furthermore, data aggregation is a mechanism that minimizes the energy; however, in addition, these aggregated data and networks can be subject to different types of attacks due to the vulnerable characteristics of the network. Hence it is important to provide end-to-end security in the data aggregation mechanism in this we design and develop dual layer integrated (DLI)-security architecture for secure data aggregation; DLI-security architecture is an integration of two distinctive layers. The first layer of architecture deals with developing an authentication for reputation-based communication; the second layer of architecture focuses on securing the aggregated data through a consensus-based approach. The experiment outcome shows that DLI identifies the correct data packets and discards the unsecured data packets in energy efficient way with minimal computation overhead and higher throughput in comparison with the existing model

    Concepts and evolution of research in the field of wireless sensor networks

    Full text link
    The field of Wireless Sensor Networks (WSNs) is experiencing a resurgence of interest and a continuous evolution in the scientific and industrial community. The use of this particular type of ad hoc network is becoming increasingly important in many contexts, regardless of geographical position and so, according to a set of possible application. WSNs offer interesting low cost and easily deployable solutions to perform a remote real time monitoring, target tracking and recognition of physical phenomenon. The uses of these sensors organized into a network continue to reveal a set of research questions according to particularities target applications. Despite difficulties introduced by sensor resources constraints, research contributions in this field are growing day by day. In this paper, we present a comprehensive review of most recent literature of WSNs and outline open research issues in this field
    • …
    corecore