24 research outputs found
Evaluation of RPL’s Single Metric Objective Functions
In this paper, we evaluate the performance of RPL
(IPv6 Routing Protocol for Low Power and Lossy Networks)
based on the Objective Function being used to construct the
Destination Oriented Directed Acyclic Graph (DODAG). Using
the Cooja simulator, we compared Objective Function Zero (OF0)
with the Minimum Rank with Hysteresis Objective Function
(MRHOF) in terms of average power consumption, packet loss
ratio, and average end-to-end latency. Our study shows that RPL
performs better in terms of packet loss ratio and average endto-end
latency when MRHOF is used as an objective function.
However, the average power consumption is noticeably higher
compared to OF0
Ubiquitous model for wireless sensor networks monitoring
Wireless Sensor Networks (WSNs) belongs to a new technology trend where tiny and resource constrained devices are wirelessly interconnected and are able to interact with the surrounding environment by collecting data, such as temperature and humidity.
Recently, due to the huge growth of mobile devices usage with Internet connection, smartphones are becoming the center of future ubiquitous
wireless networks allowing users to access data network services, anytime and anywhere. According to the Internet of Things vision, interconnecting WSNs with smartphones and the Internet is a big challenge. Then, due to
the heterogeneity of these devices new architectures are required.
This dissertation focuses on the design and construction of a ubiquitous architecture for WSNs monitoring based on Web services, a relational database, and an Android mobile application. This architecture allows
mobile users accessing real-time or historical data in a ubiquitous environment using smartphones. Besides that, a push notification system to alert mobile users when a sensor parameter overcomes a given threshold was created.
The entire solution was evaluated and demonstrated using a laboratory WSN testbed, and is ready for use.As redes de sensores sem fios fazem parte de uma nova tendência
tecnológica na qual pequenos dispositivos com recursos limitados
comunicam entre si, sem fios, e interagem com o ambiente envolvente
recolhendo uma grande diversidade de dados, tais como a temperatura e a
humidade.
Recentemente, devido ao enorme crescimento no uso de dispositivos
móveis com ligação à Internet, os smartphones estão a tornar-se o centro
das futuras redes sem fios ubíquas permitindo aos utilizadores aceder a
dados, a qualquer hora e em qualquer lugar. De acordo com a visão da
Internet of Things, interligar redes de sensores sem fios e smartphones
usando a Internet é um grande desafio e novas arquitecturas são
necessárias devido à heterogeneidade destes dispositivos.
Esta dissertação centra-se na proposta e construção de uma arquitectura
ubíqua para a monitorização de redes de sensores sem fios, baseada em
serviços Web, apoiada numa base de dados relacional e uma aplicação
móvel para o sistema operative Android. Esta arquitectura permite que os
utilizadores móveis acedam a dados em tempo real e também a dados
históricos, num ambiente móvel, usando smartphones. Além disso, foi
desenvolvido um sistema de notificações push que alerta o utilizador
quando um dado parâmetro de um sensor ultrapassa um limiar
pré-definido.
A solução construída foi testada e demonstrada utilizando uma testbed
laboratorial e está pronta para utilização
Path Reecovery in 6LoWPAN Routing Protocol
6LoWPAN has become a new technology to provide the Internetconnectivity to the traditional wireless sensor network (WSN). In order to route thedelivered packet from originator to destination nodes, the simplified Ad-hoc On-Demand Distance Vector (AODV) routing protocol for 6LoWPAN with 6LoWPANAd-Hoc On-Demand Distance Vector Routing (LOAD) has been introduced.However, the conceptual LOAD routing protocol has yet proposed any path recoverymechanism in 6LoWPAN. In this paper, an originator recognition (OR) path recoverymechanism is proposed for the 6LoWPAN LOAD-based routing protocol. In thisproposed mechanism, the participated nodes will memorize the originator addressattached within data packet during the data transmission. When a link break happenson destination path, the LOAD protocol message will be amended by inserting anidentity key, which is a memorial of originator address, in the generated route error(RERR) message before transmitted towards the originator for the failure notification.This identity key is then used by the originator to initialize path recovery in order toretransmit the failed data packet to the unreachable destination node. Instead of usingMAC address in the LOAD routing protocol, IP address is used in the proposedOriginator Recognition (OR) path recovery mechanism (OR-LOAD) routing protocolwhich is designed for the global routing. The proposed OR-LOAD routing protocolhas been examined under noisy 6LoWPAN environment in Qualnet simulator. Itsperformance is then evaluated and compared to AODV routing protocol in terms ofpacket delivery ratio and average energy consumption. The simulation results showthat the proposed OR-LOAD outperforms AODV with packet delivery ratio of 19.4%,and with comparable average energy consumption in both routing protocols
Study and Optimized Simulation of OSPFv3 Routing Protocol in IPv6 Network
Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using 2018;cisco packet tracer2019;. 2018;Ping2019; the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment
Management system for IPv6-enabled wireless sensor networks
“Copyright © [2011] IEEE. Reprinted from Internet of Things (iThings/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing. ISBN 978-1-4577-1976-9
This material is posted here with permission of the IEEE. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.”It is expected that in the near future smart objects will
have an Internet connection – this is the Internet of Things vision.
Most of these objects compatible with the IEEE 802.15.4
standard are characterized by small size, power constrains, and
small computing resources. Connecting such devices to the
Internet is considered simultaneously the biggest challenge and a
great opportunity for the Internet growth. To achieve the
Internet of things vision is necessary to support IPv6 protocol
suite in all objects. Supporting IPv6 simplifies, simultaneously,
the integration of these objects in the Internet and their
management. Actually, despite of the relevance, there are no
existing standard solutions to manage smart object networks.
Managing this type of networks poses a unique challenge because
smart object networks may be comprised of thousands of nodes,
are highly dynamic and prone to failures. This paper presents a
complete solution to manage smart object networks based on
SNMPv1 protocol. The paper also presents the design and
deployment of a laboratory testbed
ENERGY AWARE ROUTING FOR WIRELESS SENSOR NETWORKS
Wireless sensor networks are used in improving conditions in the practical field and real life which lead researchers and developers to further research it and work into improving this field. These networks consist of sensor nodes that can help acquire data and information about temperature and pressure dependent on the environment of the location which are sent from. After all that, we are bounded by a really important factor which can determine everything which is Energy. Since sensor nodes send data and information to web applications, they need an energy source to operate. Their main energy source is their batteries which offer limited source of energy. Hence, various protocols are introduced to help in many parameters of a wireless sensor network such as increasing lifetime and decreasing consumption of energy, in other words, increasing the Energy Efficiency (EF). In this paper, we evaluate consumption of average energy for various protocols used in this context after each complete logical round for these protocols, such as Energy Efficient Clustering Scheme and Stable Election Protocol. Finally, we used Matlab tool to generate results which indicate that the protocol used in this paper is efficient and reliable
IMPLEMENTATION AND OPTIMIZATION OF RWP MOBILITY MODEL IN WSNS UNDER TOSSIM SIMULATOR
Mobility has always represented a complicated phenomenon in the network routing process. This complexity is mainly facilitated in the way that ensures reliable connections for efficient orientation of data. Many years ago, different studies were initiated basing on routing protocols dedicated to static environments in order to adapt them to the mobile environment. In the present work, we have a different vision of mobility that has many advantages due to its 'mobile' principle. Indeed, instead of searching to prevent mobility and testing for example to immobilize momentarily a mobile environment to provide routing task, we will exploit this mobility to improve routing. Based on that, we carried out a set of works to achieve this objective. For our first contribution, we found that the best way to make use of this mobility is to follow a mobility model. Many models have been proposed in the literature and employed as a data source in most studies. After a careful study, we focused on the Random Waypoint mobility model (RWP) in order to ensure routing in wireless networks. Our contribution involves a Random Waypoint model (in its basic version) that was achieved on the TOSSIM simulator, and it was considered as a platform for our second (and main) contribution, in which we suggested an approach based RWP where network nodes can collaborate and work together basing on our recommended algorithm. Such an approach offers many advantages to ensure routing in a dynamic environment. Finally, our contributions comprise innovative ideas for suggesting other solutions that will improve them
Denial of service mitigation approach for IPv6-enabled smart object networks
Denial of service (DoS) attacks can be defined as any third-party action aiming to reduce or eliminate a network's capability to perform its expected functions. Although there are several standard techniques in traditional computing that mitigate the impact of some of the most common DoS attacks, this still remains a very important open problem to the network security community. DoS attacks are even more troublesome in smart object networks because of two main reasons. First, these devices cannot support the computational overhead required to implement many of the typical counterattack strategies. Second, low traffic rates are enough to drain sensors' battery energy making the network inoperable in short times. To realize the Internet of Things vision, it is necessary to integrate the smart objects into the Internet. This integration is considered an exceptional opportunity for Internet growth but, also, a security threat, because more attacks, including DoS, can be conducted. For these reasons, the prevention of DoS attacks is considered a hot topic in the wireless sensor networks scientific community. In this paper, an approach based on 6LowPAN neighbor discovery protocol is proposed to mitigate DoS attacks initiated from the Internet, without adding additional overhead on the 6LoWPAN sensor devices.This work has been partially supported by the Instituto de Telecomunicacoes, Next Generation Networks and Applications Group (NetGNA), Portugal, and by National Funding from the FCT - Fundacao para a Ciencia e Tecnologia through the Pest-OE/EEI/LA0008/2011.Oliveira, LML.; Rodrigues, JJPC.; De Sousa, AF.; Lloret, J. (2013). Denial of service mitigation approach for IPv6-enabled smart object networks. Concurrency and Computation: Practice and Experience. 25(1):129-142. doi:10.1002/cpe.2850S129142251Gershenfeld, N., Krikorian, R., & Cohen, D. (2004). The Internet of Things. Scientific American, 291(4), 76-81. doi:10.1038/scientificamerican1004-76Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38(4), 393-422. doi:10.1016/s1389-1286(01)00302-4Karl, H., & Willig, A. (2005). Protocols and Architectures for Wireless Sensor Networks. doi:10.1002/0470095121IEEE Std 802.15.4-2006 Part 15.4: wireless medium access control (MAC) and physical layer (PHY) specificationsfor low-rate wireless personal area networks (LR-WPANs) 2006ZigBee Alliance ZigBee Specification 2007WirelessHARThomepage 2012 http://www.hartcomm.org/Hui, J. W., & Culler, D. E. (2008). Extending IP to Low-Power, Wireless Personal Area Networks. IEEE Internet Computing, 12(4), 37-45. doi:10.1109/mic.2008.79Kushalnagar N Montenegro G Schumacher C IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals 2007Montenegro G Kushalnagar N Hui J Culler D Transmission of IPv6 Packets over IEEE 802.15.4 Networks 2007Shelby Z Thubert P Hui J Chakrabarti S Bormann C Nordmark E 6LoWPAN Neighbor Discovery 2011Zhou, L., Chao, H.-C., & Vasilakos, A. V. (2011). Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358-1367. doi:10.1109/jsac.2011.110803Roman, R., & Lopez, J. (2009). Integrating wireless sensor networks and the internet: a security analysis. Internet Research, 19(2), 246-259. doi:10.1108/10662240910952373Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2-23. doi:10.1109/comst.2006.315852Xiaojiang Du, & Hsiao-Hwa Chen. (2008). Security in wireless sensor networks. IEEE Wireless Communications, 15(4), 60-66. doi:10.1109/mwc.2008.4599222Pelechrinis, K., Iliofotou, M., & Krishnamurthy, S. V. (2011). Denial of Service Attacks in Wireless Networks: The Case of Jammers. IEEE Communications Surveys & Tutorials, 13(2), 245-257. doi:10.1109/surv.2011.041110.00022Zhou, L., Wang, X., Tu, W., Muntean, G., & Geller, B. (2010). Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks. IEEE Journal on Selected Areas in Communications, 28(3), 409-419. doi:10.1109/jsac.2010.100412Lin, K., Lai, C.-F., Liu, X., & Guan, X. (2010). Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks. Mobile Networks and Applications, 17(1), 75-89. doi:10.1007/s11036-010-0287-xLi, H., Lin, K., & Li, K. (2011). Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Computer Communications, 34(4), 591-597. doi:10.1016/j.comcom.2010.02.026Oliveira, L. M. L., de Sousa, A. F., & Rodrigues, J. J. P. C. (2011). Routing and mobility approaches in IPv6 over LoWPAN mesh networks. International Journal of Communication Systems, 24(11), 1445-1466. doi:10.1002/dac.1228Narten T Nordmark E Simpson W Soliman H Neighbor Discovery for IP version 6 (IPv6) 2007Singh H Beebee W Nordmark E IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes 2010Roman, R., Lopez, J., & Gritzalis, S. (2008). Situation awareness mechanisms for wireless sensor networks. IEEE Communications Magazine, 46(4), 102-107. doi:10.1109/mcom.2008.4481348Sakarindr, P., & Ansari, N. (2007). Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. IEEE Wireless Communications, 14(5), 8-20. doi:10.1109/mwc.2007.4396938Tsao T Alexander R Dohler M Daza V Lozano A A Security Framework for Routing over Low Power and Lossy Networks 2009Karlof C Wagner D Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 2003 113 127 10.1109/SNPA.2003.1203362Hui J Thubert P Compression Format for IPv6 Datagrams in 6LoWPAN Networks 2009Elaine Shi, & Perrig, A. (2004). Designing Secure Sensor Networks. IEEE Wireless Communications, 11(6), 38-43. doi:10.1109/mwc.2004.1368895Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), 325-349. doi:10.1016/j.adhoc.2003.09.01
An enhanced group mobility management method in wireless body area networks
Mobility management of wireless body area networks (WBANs) is an emerging key element in the healthcare system. The remote sensor nodes of WBAN are usually deployed on subjects’ body. Certain proxy mobile IPv6 (PMIP) methods have been recommended, however, PMIP is relatively impractical in group mobility management pertaining to WBAN. It is likely to cause enormous registration and handover interruptions. This paper presents an approach aims at overcome these limitations using improved group mobility management method. The method emphasizes on incorporation of authentication, authorization, and accounting (AAA) service into the local mobility anchor (LMA) as an alternative to independent practice. Furthermore, proxy binding update (PBU) and AAA inquiry messages are merged. Additionally, AAA response and proxy binding acknowledge (PBA) message are combined. The experiment results demonstrate that the proposed method outperforms the existing PMIP methods in terms of delay time for registration, the handover interruptions and the average signaling cost