569 research outputs found

    Utilization Of A Large-Scale Wireless Sensor Network For Intrusion Detection And Border Surveillance

    Get PDF
    To control the border more effectively, countries may deploy a detection system that enables real-time surveillance of border integrity. Events such as border crossings need to be monitored in real time so that any border entries can be noted by border security forces and destinations marked for apprehension. Wireless Sensor Networks (WSNs) are promising for border security surveillance because they enable enforcement teams to monitor events in the physical environment. In this work, probabilistic models have been presented to investigate senor development schemes while considering the environmental factors that affect the sensor performance. Simulation studies have been carried out using the OPNET to verify the theoretical analysis and to find an optimal node deployment scheme that is robust and efficient by incorporating geographical coordination in the design. Measures such as adding camera and range-extended antenna to each node have been investigated to improve the system performance. A prototype WSN based surveillance system has been developed to verify the proposed approach

    Solutions and Tools for Secure Communication in Wireless Sensor Networks

    Get PDF
    Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of security material, and effective prevention and reaction against security threats and attacks. However, WSNs are mainly composed of resource-constrained devices. That is, network nodes feature reduced capabilities, especially in terms of memory storage, computing power, transmission rate, and energy availability. As a consequence, assuring secure communication in WSNs results to be more difficult than in other kinds of network. In fact, trading effectiveness of adopted solutions with their efficiency becomes far more important. In addition, specific device classes or technologies may require to design ad hoc security solutions. Also, it is necessary to efficiently manage security material, and dynamically cope with changes of security requirements. Finally, security threats and countermeasures have to be carefully considered since from the network design phase. This Ph.D. dissertion considers secure communication in WSNs, and provides the following contributions. First, we provide a performance evaluation of IEEE 802.15.4 security services. Then, we focus on the ZigBee technology and its security services, and propose possible solutions to some deficiencies and inefficiencies. Second, we present HISS, a highly scalable and efficient key management scheme, able to contrast collusion attacks while displaying a graceful degradation of performance. Third, we present STaR, a software component for WSNs that secures multiple traffic flows at the same time. It is transparent to the application, and provides runtime reconfigurability, thus coping with dynamic changes of security requirements. Finally, we describe ASF, our attack simulation framework for WSNs. Such a tool helps network designers to quantitatively evaluate effects of security attacks, produce an attack ranking based on their severity, and thus select the most appropriate countermeasures

    Low-Power Pıc-Based Sensor Node Devıce Desıgn And Theoretıcal Analysıs Of Energy Consumptıon In Wıreless Sensor Networks

    Get PDF
    Teknolojinin ilerlemesi, daha enerji verimli ve daha ucuz elektronik bileşenlerinin daha küçük üretilmesini sağlamıştır. Bu nedenle, daha önce mevcut birçok bilgisayar ve elektronik bilim-mühendislik fikirleri uygulanabilir hale gelmiştir. Bunlardan birisi de kablosuz sensör ağları teknolojisidir. Kablosuz algılayıcı ağlar, düşük enerji tüketimi ve gerekli teknik gereksinimlerin gerçekleşmesi ile uygulanabilir hale gelmiştir. Ayrıca, Kablosuz algılayıcı ağlarının tasarımında iletişim algoritmaları, enerji tasarruf protokolleri ve yenilenebilir enerji teknolojileri gibi diğer bilimsel çalışmalar zorunlu hale gelmiştir. Bu tez, mikroelektronik sistemler, kablosuz iletişim ve dijital elektronik teknolojisinin ilerlemesiyle uygulanabilir hale gelmiş sensör ağları teknolojisini kapsamaktadır. Birincisi, algılama görevleri ve potansiyel algılayıcı ağ uygulamaları araştırılmış ve algılayıcı ağlarının tasarımını etkileyen faktörlerin gözden geçirilmesi sağlanmıştır. Ardından sensör ağları için iletişim mimarisi ana hatlarıyla belirtilmiştir. Ayrıca, tek bir düğümün WLAN ile iletişim kurabilmesi için yeni donanım mimarisi tasarlanmış ve düğümlerde yenilenebilir enerji kaynakları kullanılmıştır. Bu tezde WSN, analitik bilim ve uygulamalı bilim açısından incelenmiştir. Düşük enerji tüketimi ve iletişim protokolleri arasındaki ilişki değerlendirilmiş ve bilimsel sonuçlara varılmıştır. Teorik analizler bilimsel uygulamalarla desteklenmiştir. Çalışmalar, düşük enerji ve maksimum verimlilik prensibinin gerçekleştirilmesine dayalı kablosuz sensör ağları üzerinde gerçekleştirilmiştir. Kablosuz sensör ağlari sistemi tasarlandıktan sonra; sensör düğümlerinin enerji tüketimi ve kablosuz ağdaki davranışları test ve analiz edilmiştir. Düşük enerji tüketimi ile sensör düğümleri arasındaki ilişki detaylı olarak değerlendirilmiştir. PIC Tabanlı mikro denetleyiciler sensör düğümlerinin tasarımında kullanılmış ve çok düşük maliyetli tasarım için ultra düşük güçte, nanoWatt teknolojisi ile desteklenen sensör düğümleri tasarlanmıştır. İşleme birimi, bellek birimi ve kablosuz iletişim birimi sensör viii düğümlerine entegre edilmiştir. Tasarlanan sensör düğümünün işletim sistemi PIC C dili ile yazılmıştır ve PIC işletim sistemi nem, sıcaklık, ışığa duyarlılık ve duman sensörü gibi farklı özelliklerin ölçülmesine izin vermiştir. Sensörlerden gelen verilerin merkezi bir konumdan kaydedilmesi ve izlenebilmesi için, C# programlama dili ile bilgisayar yazılımı geliştirilmiştir. Gelişmiş algılayıcı düğümler tarafından alınan kararların uygulanması için yazılım algoritması ve donanım modüllerini içeren karar verme sistemi tasarlanmıştır. Gelişmiş PIC Tabanlı sensör düğümleri, enerji üretimi ve enerji tasarrufu için, güneş enerjisi paneli, şarj edilebilir pil ve süper kapasitör gibi yenilenebilir enerji kaynakları ile benzersiz bir PIC Kontrollü voltaj birimi ile desteklenmiştir. Geliştirilmiş kablosuz sensör ağları sistemi, endüstri uygulamaları, akıllı fabrikalar ve akıllı evler gibi günlük hayat uygulamaları için de kullanılabilecektir. Kablosuz algılayıcı ağlar geniş bir aralıkta kullanılmak üzere tasarlanmıştır. Tezin sonuçları, özellikle yenilenebilir enerji kaynakları ile WSN'nin geliştirilmesine yardımcı olmayı amaçlamaktadır

    Analysis of current and potential sensor network technologies and their incorporation as embedded structural system

    Get PDF
    This document provides a brief overview of the actual wireless ad hoc sensor networks technologies and standards available, especially in view of their possible implementation for shipping container protection and monitoring within the framework of the STEC Action aiming at analyzing possible technical solutions to improve the security of the millions of containers moving in and out of Europe. Examples of applications and research projects are reported from the literature to give insights on the possibility of implementation of wireless sensor networks in real world scenarios.JRC.G.5-European laboratory for structural assessmen

    Development of a wireless sensor network for agricultural monitoring for Internet of Things (IoT)

    Get PDF
    Monitoring of the agricultural environment has become an important area of control and protection which provides real-time system and control communication with the physical world. This thesis focuses on Development ofa wireless Sensor Network for agricultural monitoring for Internet of things (IoT) to monitor environmental condition. Among the various technologies for Agriculture monitoring, Wireless Sensor Networks (WSNs) are perceived as an amazing one to gather and process information in the agricultural area with low-cost and low-energy consumption. WSN is capable of providing processed field data in real time from sensors which are physically distributed in the field. Agriculture and farming are one of the industries which have a late occupied their regards for WSNs, looking for this financially acute innovation to improve its production and upgrade agribusiness yield standard. Wireless Sensor Networks (WSNs) have pulled in a lot consideration in recent years.The proposed system uses WSN sensors to capture and track information pertaining to crop growth condition outside and inside greenhouses. 6LowPAN network protocol is used for low power consumption and for transmitting and receiving of data packets.This thesis introduces the agricultural monitoring system's hardware design, system architecture, and software process control. Agriculture monitoring system set-up is based on Contiki OS while device testing is carried out using real-time farm information and historical dat

    Advancing the Standards for Unmanned Air System Communications, Navigation and Surveillance

    Get PDF
    Under NASA program NNA16BD84C, new architectures were identified and developed for supporting reliable and secure Communications, Navigation and Surveillance (CNS) needs for Unmanned Air Systems (UAS) operating in both controlled and uncontrolled airspace. An analysis of architectures for the two categories of airspace and an implementation technology readiness analysis were performed. These studies produced NASA reports that have been made available in the public domain and have been briefed in previous conferences. We now consider how the products of the study are influencing emerging directions in the aviation standards communities. The International Civil Aviation Organization (ICAO) Communications Panel (CP), Working Group I (WG-I) is currently developing a communications network architecture known as the Aeronautical Telecommunications Network with Internet Protocol Services (ATN/IPS). The target use case for this service is secure and reliable Air Traffic Management (ATM) for manned aircraft operating in controlled airspace. However, the work is more and more also considering the emerging class of airspace users known as Remotely Piloted Aircraft Systems (RPAS), which refers to certain UAS classes. In addition, two Special Committees (SCs) in the Radio Technical Commission for Aeronautics (RTCA) are developing Minimum Aviation System Performance Standards (MASPS) and Minimum Operational Performance Standards (MOPS) for UAS. RTCA SC-223 is investigating an Internet Protocol Suite (IPS) and AeroMACS aviation data link for interoperable (INTEROP) UAS communications. Meanwhile, RTCA SC-228 is working to develop Detect And Avoid (DAA) equipment and a Command and Control (C2) Data Link MOPS establishing LBand and C-Band solutions. These RTCA Special Committees along with ICAO CP WG/I are therefore overlapping in terms of the Communication, Navigation and Surveillance (CNS) alternatives they are seeking to provide for an integrated manned- and unmanned air traffic management service as well as remote pilot command and control. This paper presents UAS CNS architecture concepts developed under the NASA program that apply to all three of the aforementioned committees. It discusses the similarities and differences in the problem spaces under consideration in each committee, and considers the application of a common set of CNS alternatives that can be widely applied. As the works of these committees progress, it is clear that the overlap will need to be addressed to ensure a consistent and safe framework for worldwide aviation. In this study, we discuss similarities and differences in the various operational models and show how the CNS architectures developed under the NASA program apply

    Routing and Mobility on IPv6 over LoWPAN

    Get PDF
    The IoT means a world-wide network of interconnected objects based on standard communication protocols. An object in this context is a quotidian physical device augmented with sensing/actuating, processing, storing and communication capabilities. These objects must be able to interact with the surrounding environment where they are placed and to cooperate with neighbouring objects in order to accomplish a common objective. The IoT objects have also the capabilities of converting the sensed data into automated instructions and communicating them to other objects through the communication networks, avoiding the human intervention in several tasks. Most of IoT deployments are based on small devices with restricted computational resources and energy constraints. For this reason, initially the scientific community did not consider the use of IP protocol suite in this scenarios because there was the perception that it was too heavy to the available resources on such devices. Meanwhile, the scientific community and the industry started to rethink about the use of IP protocol suite in all IoT devices and now it is considered as the solution to provide connectivity between the IoT devices, independently of the Layer 2 protocol in use, and to connect them to the Internet. Despite the use of IP suite protocol in all devices and the amount of solutions proposed, many open issues remain unsolved in order to reach a seamless integration between the IoT and the Internet and to provide the conditions to IoT service widespread. This thesis addressed the challenges associated with the interconnectivity between the Internet and the IoT devices and with the security aspects of the IoT. In the interconnectivity between the IoT devices and the Internet the problem is how to provide valuable information to the Internet connected devices, independently of the supported IP protocol version, without being necessary accessed directly to the IoT nodes. In order to solve this problem, solutions based on Representational state transfer (REST) web services and IPv4 to IPv6 dual stack transition mechanism were proposed and evaluated. The REST web service and the transition mechanism runs only at the border router without penalizing the IoT constrained devices. The mitigation of the effects of internal and external security attacks minimizing the overhead imposed on the IoT devices is the security challenge addressed in this thesis. Three different solutions were proposed. The first is a mechanism to prevent remotely initiated transport level Denial of Service attacks that avoids the use of inefficient and hard to manage traditional firewalls. It is based on filtering at the border router the traffic received from the Internet and destined to the IoT network according to the conditions announced by each IoT device. The second is a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. The third is a network admission control framework that prevents IoT unauthorized nodes to communicate with IoT authorized nodes or with the Internet, which drastically reduces the number of possible security attacks. The network admission control was also exploited as a management mechanism as it can be used to manage the network size in terms of number of nodes, making the network more manageable, increasing its reliability and extending its lifetime.A IoT (Internet of Things) tem suscitado o interesse tanto da comunidade académica como da indústria, uma vez que os campos de aplicação são inúmeros assim como os potenciais ganhos que podem ser obtidos através do uso deste tipo de tecnologia. A IoT significa uma rede global de objetos ligados entre si através de uma rede de comunicações baseada em protocolos standard. Neste contexto, um objeto é um objeto físico do dia a dia ao qual foi adicionada a capacidade de medir e de atuar sobre variáveis físicas, de processar e armazenar dados e de comunicar. Estes objetos têm a capacidade de interagir com o meio ambiente envolvente e de cooperar com outros objetos vizinhos de forma a atingirem um objetivo comum. Estes objetos também têm a capacidade de converter os dados lidos em instruções e de as comunicar a outros objetos através da rede de comunicações, evitando desta forma a intervenção humana em diversas tarefas. A maior parte das concretizações de sistemas IoT são baseados em pequenos dispositivos autónomos com restrições ao nível dos recursos computacionais e de retenção de energia. Por esta razão, inicialmente a comunidade científica não considerou adequado o uso da pilha protocolar IP neste tipo de dispositivos, uma vez que havia a perceção de que era muito pesada para os recursos computacionais disponíveis. Entretanto, a comunidade científica e a indústria retomaram a discussão acerca dos benefícios do uso da pilha protocolar em todos os dispositivos da IoT e atualmente é considerada a solução para estabelecer a conetividade entre os dispositivos IoT independentemente do protocolo da camada dois em uso e para os ligar à Internet. Apesar do uso da pilha protocolar IP em todos os dispositivos e da quantidade de soluções propostas, são vários os problemas por resolver no que concerne à integração contínua e sem interrupções da IoT na Internet e de criar as condições para a adoção generalizada deste tipo de tecnologias. Esta tese versa sobre os desafios associados à integração da IoT na Internet e dos aspetos de segurança da IoT. Relativamente à integração da IoT na Internet o problema é como fornecer informação válida aos dispositivos ligados à Internet, independentemente da versão do protocolo IP em uso, evitando o acesso direto aos dispositivos IoT. Para a resolução deste problema foram propostas e avaliadas soluções baseadas em web services REST e em mecanismos de transição IPv4 para IPv6 do tipo pilha dupla (dual stack). O web service e o mecanismo de transição são suportados apenas no router de fronteira, sem penalizar os dispositivos IoT. No que concerne à segurança, o problema é mitigar os efeitos dos ataques de segurança internos e externos iniciados local e remotamente. Foram propostas três soluções diferentes, a primeira é um mecanismo que minimiza os efeitos dos ataques de negação de serviço com origem na Internet e que evita o uso de mecanismos de firewalls ineficientes e de gestão complexa. Este mecanismo filtra no router de fronteira o tráfego com origem na Internet é destinado à IoT de acordo com as condições anunciadas por cada um dos dispositivos IoT da rede. A segunda solução, é uma framework de network admission control que controla quais os dispositivos que podem aceder à rede com base na autorização administrativa e que aplica políticas de conformidade relativas à segurança aos dispositivos autorizados. A terceira é um mecanismo de network admission control para redes 6LoWPAN que evita que dispositivos não autorizados comuniquem com outros dispositivos legítimos e com a Internet o que reduz drasticamente o número de ataques à segurança. Este mecanismo também foi explorado como um mecanismo de gestão uma vez que pode ser utilizado a dimensão da rede quanto ao número de dispositivos, tornando-a mais fácil de gerir e aumentando a sua fiabilidade e o seu tempo de vida
    corecore