569 research outputs found
Utilization Of A Large-Scale Wireless Sensor Network For Intrusion Detection And Border Surveillance
To control the border more effectively, countries may deploy a detection system that enables real-time surveillance of border integrity. Events such as border crossings need to be monitored in real time so that any border entries can be noted by border security forces and destinations marked for apprehension. Wireless Sensor Networks (WSNs) are promising for border security surveillance because they enable enforcement teams to monitor events in the physical environment. In this work, probabilistic models have been presented to investigate senor development schemes while considering the environmental factors that affect the sensor performance. Simulation studies have been carried out using the OPNET to verify the theoretical analysis and to find an optimal node deployment scheme that is robust and efficient by incorporating geographical coordination in the design. Measures such as adding camera and range-extended antenna to each node have been investigated to improve the system performance. A prototype WSN based surveillance system has been developed to verify the proposed approach
Solutions and Tools for Secure Communication in Wireless Sensor Networks
Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of security material, and effective prevention and reaction against security threats and attacks. However, WSNs are mainly composed of resource-constrained devices. That is, network nodes feature reduced capabilities, especially in terms of memory storage, computing power, transmission rate, and energy availability.
As a consequence, assuring secure communication in WSNs results to be more difficult than in other kinds of network. In fact, trading effectiveness of adopted solutions with their efficiency becomes far more important. In addition, specific device classes or technologies may require to design ad hoc security solutions. Also, it is necessary to efficiently manage security material, and dynamically cope with changes of security requirements. Finally, security threats and countermeasures have to be carefully considered since from the network design phase.
This Ph.D. dissertion considers secure communication in WSNs, and provides the following contributions. First, we provide a performance evaluation of IEEE 802.15.4 security services. Then, we focus on the ZigBee technology and its security services, and propose possible solutions to some deficiencies and inefficiencies. Second, we present HISS, a highly scalable and efficient key management scheme, able to contrast collusion attacks while displaying a graceful degradation of performance. Third, we present STaR, a software component for WSNs that secures multiple traffic flows at the same time. It is transparent to the application, and provides runtime reconfigurability, thus coping with dynamic changes of security requirements. Finally, we describe ASF, our attack simulation framework for WSNs. Such a tool helps network designers to quantitatively evaluate effects of security attacks, produce an attack ranking based on their severity, and thus select the most appropriate countermeasures
Low-Power Pıc-Based Sensor Node Devıce Desıgn And Theoretıcal Analysıs Of Energy Consumptıon In Wıreless Sensor Networks
Teknolojinin ilerlemesi, daha enerji verimli ve daha ucuz elektronik bileşenlerinin daha
küçük üretilmesini sağlamıştır. Bu nedenle, daha önce mevcut birçok bilgisayar ve elektronik
bilim-mühendislik fikirleri uygulanabilir hale gelmiştir. Bunlardan birisi de kablosuz sensör
ağları teknolojisidir. Kablosuz algılayıcı ağlar, düşük enerji tüketimi ve gerekli teknik
gereksinimlerin gerçekleşmesi ile uygulanabilir hale gelmiştir. Ayrıca, Kablosuz algılayıcı
ağlarının tasarımında iletişim algoritmaları, enerji tasarruf protokolleri ve yenilenebilir enerji
teknolojileri gibi diğer bilimsel çalışmalar zorunlu hale gelmiştir.
Bu tez, mikroelektronik sistemler, kablosuz iletişim ve dijital elektronik teknolojisinin
ilerlemesiyle uygulanabilir hale gelmiş sensör ağları teknolojisini kapsamaktadır. Birincisi,
algılama görevleri ve potansiyel algılayıcı ağ uygulamaları araştırılmış ve algılayıcı ağlarının
tasarımını etkileyen faktörlerin gözden geçirilmesi sağlanmıştır. Ardından sensör ağları için
iletişim mimarisi ana hatlarıyla belirtilmiştir. Ayrıca, tek bir düğümün WLAN ile iletişim
kurabilmesi için yeni donanım mimarisi tasarlanmış ve düğümlerde yenilenebilir enerji
kaynakları kullanılmıştır.
Bu tezde WSN, analitik bilim ve uygulamalı bilim açısından incelenmiştir. Düşük enerji
tüketimi ve iletişim protokolleri arasındaki ilişki değerlendirilmiş ve bilimsel sonuçlara
varılmıştır. Teorik analizler bilimsel uygulamalarla desteklenmiştir. Çalışmalar, düşük enerji
ve maksimum verimlilik prensibinin gerçekleştirilmesine dayalı kablosuz sensör ağları
üzerinde gerçekleştirilmiştir. Kablosuz sensör ağlari sistemi tasarlandıktan sonra; sensör
düğümlerinin enerji tüketimi ve kablosuz ağdaki davranışları test ve analiz edilmiştir. Düşük
enerji tüketimi ile sensör düğümleri arasındaki ilişki detaylı olarak değerlendirilmiştir.
PIC Tabanlı mikro denetleyiciler sensör düğümlerinin tasarımında kullanılmış ve çok
düşük maliyetli tasarım için ultra düşük güçte, nanoWatt teknolojisi ile desteklenen sensör
düğümleri tasarlanmıştır. İşleme birimi, bellek birimi ve kablosuz iletişim birimi sensör
viii
düğümlerine entegre edilmiştir. Tasarlanan sensör düğümünün işletim sistemi PIC C dili ile
yazılmıştır ve PIC işletim sistemi nem, sıcaklık, ışığa duyarlılık ve duman sensörü gibi farklı
özelliklerin ölçülmesine izin vermiştir. Sensörlerden gelen verilerin merkezi bir konumdan
kaydedilmesi ve izlenebilmesi için, C# programlama dili ile bilgisayar yazılımı geliştirilmiştir.
Gelişmiş algılayıcı düğümler tarafından alınan kararların uygulanması için yazılım
algoritması ve donanım modüllerini içeren karar verme sistemi tasarlanmıştır. Gelişmiş PIC
Tabanlı sensör düğümleri, enerji üretimi ve enerji tasarrufu için, güneş enerjisi paneli, şarj
edilebilir pil ve süper kapasitör gibi yenilenebilir enerji kaynakları ile benzersiz bir PIC
Kontrollü voltaj birimi ile desteklenmiştir. Geliştirilmiş kablosuz sensör ağları sistemi, endüstri
uygulamaları, akıllı fabrikalar ve akıllı evler gibi günlük hayat uygulamaları için de
kullanılabilecektir. Kablosuz algılayıcı ağlar geniş bir aralıkta kullanılmak üzere tasarlanmıştır.
Tezin sonuçları, özellikle yenilenebilir enerji kaynakları ile WSN'nin geliştirilmesine yardımcı
olmayı amaçlamaktadır
Recommended from our members
Obstacle avoidance routing scheme through optimal sink movement for home monitoring and mobile robotic consumer devices
In recent years, ZigBee has been proven to be an excellent solution to create scalable and flexible home automation networks. In a home automation network, consumer devices typically collect data from a home monitoring environment and then transmit the data to an end user through multi-hop communication without the need for any human intervention. However, due to the presence of typical obstacles in a home environment, error-free reception may not be possible, particularly for power constrained devices. A mobile sink based data transmission scheme can be one solution but obstacles create significant complexities for the sink movement path determination process. Therefore, an obstacle avoidance data routing scheme is of vital importance to the design of an efficient home automation system.
This paper presents a mobile sink based obstacle avoidance routing scheme for a home monitoring system. The mobile sink collects data by traversing through the obstacle avoidance path. Through ZigBee based hardware implementation and verification, the proposed scheme successfully transmits data through the obstacle avoidance path to improve network performance in terms of life span, energy consumption and reliability. The application of this work can be applied to a wide range of intelligent pervasive consumer products and services including robotic vacuum cleaners and personal security robots1
Analysis of current and potential sensor network technologies and their incorporation as embedded structural system
This document provides a brief overview of the actual wireless ad hoc sensor networks technologies and standards available, especially in view of their possible implementation for shipping container protection and monitoring within the framework of the STEC Action aiming at analyzing possible technical solutions to improve the security of the millions of containers moving in and out of Europe. Examples of applications and research projects are reported from the literature to give insights on the possibility of implementation of wireless sensor networks in real world scenarios.JRC.G.5-European laboratory for structural assessmen
Development of a wireless sensor network for agricultural monitoring for Internet of Things (IoT)
Monitoring of the agricultural environment has become an important area of control and protection which provides real-time system and control communication with the physical world. This thesis focuses on Development ofa wireless Sensor Network for agricultural monitoring for Internet of things (IoT) to monitor environmental condition. Among the various technologies for Agriculture monitoring, Wireless Sensor Networks (WSNs) are perceived as an amazing one to gather and process information in the agricultural area with low-cost and low-energy consumption. WSN is capable of providing processed field data in real time from sensors which are physically distributed in the field. Agriculture and farming are one of the industries which have a late occupied their regards for WSNs, looking for this financially acute innovation to improve its production and upgrade agribusiness yield standard. Wireless Sensor Networks (WSNs) have pulled in a lot consideration in recent years.The proposed system uses WSN sensors to capture and track information pertaining to crop growth condition outside and inside greenhouses. 6LowPAN network protocol is used for low power consumption and for transmitting and receiving of data packets.This thesis introduces the agricultural monitoring system's hardware design, system architecture, and software process control. Agriculture monitoring system set-up is based on Contiki OS while device testing is carried out using real-time farm information and historical dat
Advancing the Standards for Unmanned Air System Communications, Navigation and Surveillance
Under NASA program NNA16BD84C, new architectures were identified and developed for supporting reliable and secure Communications, Navigation and Surveillance (CNS) needs for Unmanned Air Systems (UAS) operating in both controlled and uncontrolled airspace. An analysis of architectures for the two categories of airspace and an implementation technology readiness analysis were performed. These studies produced NASA reports that have been made available in the public domain and have been briefed in previous conferences. We now consider how the products of the study are influencing emerging directions in the aviation standards communities. The International Civil Aviation Organization (ICAO) Communications Panel (CP), Working Group I (WG-I) is currently developing a communications network architecture known as the Aeronautical Telecommunications Network with Internet Protocol Services (ATN/IPS). The target use case for this service is secure and reliable Air Traffic Management (ATM) for manned aircraft operating in controlled airspace. However, the work is more and more also considering the emerging class of airspace users known as Remotely Piloted Aircraft Systems (RPAS), which refers to certain UAS classes. In addition, two Special Committees (SCs) in the Radio Technical Commission for Aeronautics (RTCA) are developing Minimum Aviation System Performance Standards (MASPS) and Minimum Operational Performance Standards (MOPS) for UAS. RTCA SC-223 is investigating an Internet Protocol Suite (IPS) and AeroMACS aviation data link for interoperable (INTEROP) UAS communications. Meanwhile, RTCA SC-228 is working to develop Detect And Avoid (DAA) equipment and a Command and Control (C2) Data Link MOPS establishing LBand and C-Band solutions. These RTCA Special Committees along with ICAO CP WG/I are therefore overlapping in terms of the Communication, Navigation and Surveillance (CNS) alternatives they are seeking to provide for an integrated manned- and unmanned air traffic management service as well as remote pilot command and control. This paper presents UAS CNS architecture concepts developed under the NASA program that apply to all three of the aforementioned committees. It discusses the similarities and differences in the problem spaces under consideration in each committee, and considers the application of a common set of CNS alternatives that can be widely applied. As the works of these committees progress, it is clear that the overlap will need to be addressed to ensure a consistent and safe framework for worldwide aviation. In this study, we discuss similarities and differences in the various operational models and show how the CNS architectures developed under the NASA program apply
Routing and Mobility on IPv6 over LoWPAN
The IoT means a world-wide network of interconnected objects based on standard communication
protocols. An object in this context is a quotidian physical device augmented with
sensing/actuating, processing, storing and communication capabilities. These objects must be
able to interact with the surrounding environment where they are placed and to cooperate with
neighbouring objects in order to accomplish a common objective. The IoT objects have also the
capabilities of converting the sensed data into automated instructions and communicating them
to other objects through the communication networks, avoiding the human intervention in several
tasks. Most of IoT deployments are based on small devices with restricted computational
resources and energy constraints. For this reason, initially the scientific community did not
consider the use of IP protocol suite in this scenarios because there was the perception that it
was too heavy to the available resources on such devices. Meanwhile, the scientific community
and the industry started to rethink about the use of IP protocol suite in all IoT devices and now
it is considered as the solution to provide connectivity between the IoT devices, independently
of the Layer 2 protocol in use, and to connect them to the Internet. Despite the use of IP suite
protocol in all devices and the amount of solutions proposed, many open issues remain unsolved
in order to reach a seamless integration between the IoT and the Internet and to provide the
conditions to IoT service widespread. This thesis addressed the challenges associated with the
interconnectivity between the Internet and the IoT devices and with the security aspects of
the IoT. In the interconnectivity between the IoT devices and the Internet the problem is how
to provide valuable information to the Internet connected devices, independently of the supported
IP protocol version, without being necessary accessed directly to the IoT nodes. In order
to solve this problem, solutions based on Representational state transfer (REST) web services
and IPv4 to IPv6 dual stack transition mechanism were proposed and evaluated. The REST web
service and the transition mechanism runs only at the border router without penalizing the IoT
constrained devices. The mitigation of the effects of internal and external security attacks
minimizing the overhead imposed on the IoT devices is the security challenge addressed in this
thesis. Three different solutions were proposed. The first is a mechanism to prevent remotely
initiated transport level Denial of Service attacks that avoids the use of inefficient and hard to
manage traditional firewalls. It is based on filtering at the border router the traffic received
from the Internet and destined to the IoT network according to the conditions announced by
each IoT device. The second is a network access security framework that can be used to control
the nodes that have access to the network, based on administrative approval, and to enforce
security compliance to the authorized nodes. The third is a network admission control framework
that prevents IoT unauthorized nodes to communicate with IoT authorized nodes or with
the Internet, which drastically reduces the number of possible security attacks. The network
admission control was also exploited as a management mechanism as it can be used to manage
the network size in terms of number of nodes, making the network more manageable, increasing
its reliability and extending its lifetime.A IoT (Internet of Things) tem suscitado o interesse tanto da comunidade académica como
da indústria, uma vez que os campos de aplicação são inúmeros assim como os potenciais ganhos
que podem ser obtidos através do uso deste tipo de tecnologia. A IoT significa uma rede
global de objetos ligados entre si através de uma rede de comunicações baseada em protocolos
standard. Neste contexto, um objeto é um objeto físico do dia a dia ao qual foi adicionada a
capacidade de medir e de atuar sobre variáveis físicas, de processar e armazenar dados e de
comunicar. Estes objetos têm a capacidade de interagir com o meio ambiente envolvente e de
cooperar com outros objetos vizinhos de forma a atingirem um objetivo comum. Estes objetos
também têm a capacidade de converter os dados lidos em instruções e de as comunicar a outros
objetos através da rede de comunicações, evitando desta forma a intervenção humana em
diversas tarefas. A maior parte das concretizações de sistemas IoT são baseados em pequenos
dispositivos autónomos com restrições ao nível dos recursos computacionais e de retenção de
energia. Por esta razão, inicialmente a comunidade científica não considerou adequado o uso
da pilha protocolar IP neste tipo de dispositivos, uma vez que havia a perceção de que era muito
pesada para os recursos computacionais disponíveis. Entretanto, a comunidade científica e a
indústria retomaram a discussão acerca dos benefícios do uso da pilha protocolar em todos os
dispositivos da IoT e atualmente é considerada a solução para estabelecer a conetividade entre
os dispositivos IoT independentemente do protocolo da camada dois em uso e para os ligar à
Internet. Apesar do uso da pilha protocolar IP em todos os dispositivos e da quantidade de
soluções propostas, são vários os problemas por resolver no que concerne à integração contínua
e sem interrupções da IoT na Internet e de criar as condições para a adoção generalizada deste
tipo de tecnologias.
Esta tese versa sobre os desafios associados à integração da IoT na Internet e dos aspetos de
segurança da IoT. Relativamente à integração da IoT na Internet o problema é como fornecer
informação válida aos dispositivos ligados à Internet, independentemente da versão do protocolo
IP em uso, evitando o acesso direto aos dispositivos IoT. Para a resolução deste problema foram
propostas e avaliadas soluções baseadas em web services REST e em mecanismos de transição
IPv4 para IPv6 do tipo pilha dupla (dual stack). O web service e o mecanismo de transição são
suportados apenas no router de fronteira, sem penalizar os dispositivos IoT. No que concerne
à segurança, o problema é mitigar os efeitos dos ataques de segurança internos e externos
iniciados local e remotamente. Foram propostas três soluções diferentes, a primeira é um
mecanismo que minimiza os efeitos dos ataques de negação de serviço com origem na Internet e
que evita o uso de mecanismos de firewalls ineficientes e de gestão complexa. Este mecanismo
filtra no router de fronteira o tráfego com origem na Internet é destinado à IoT de acordo
com as condições anunciadas por cada um dos dispositivos IoT da rede. A segunda solução,
é uma framework de network admission control que controla quais os dispositivos que podem
aceder à rede com base na autorização administrativa e que aplica políticas de conformidade
relativas à segurança aos dispositivos autorizados. A terceira é um mecanismo de network
admission control para redes 6LoWPAN que evita que dispositivos não autorizados comuniquem
com outros dispositivos legítimos e com a Internet o que reduz drasticamente o número de
ataques à segurança. Este mecanismo também foi explorado como um mecanismo de gestão uma
vez que pode ser utilizado a dimensão da rede quanto ao número de dispositivos, tornando-a
mais fácil de gerir e aumentando a sua fiabilidade e o seu tempo de vida
- …