24 research outputs found

    Evaluation of RPL’s Single Metric Objective Functions

    Get PDF
    In this paper, we evaluate the performance of RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) based on the Objective Function being used to construct the Destination Oriented Directed Acyclic Graph (DODAG). Using the Cooja simulator, we compared Objective Function Zero (OF0) with the Minimum Rank with Hysteresis Objective Function (MRHOF) in terms of average power consumption, packet loss ratio, and average end-to-end latency. Our study shows that RPL performs better in terms of packet loss ratio and average endto-end latency when MRHOF is used as an objective function. However, the average power consumption is noticeably higher compared to OF0

    Ubiquitous model for wireless sensor networks monitoring

    Get PDF
    Wireless Sensor Networks (WSNs) belongs to a new technology trend where tiny and resource constrained devices are wirelessly interconnected and are able to interact with the surrounding environment by collecting data, such as temperature and humidity. Recently, due to the huge growth of mobile devices usage with Internet connection, smartphones are becoming the center of future ubiquitous wireless networks allowing users to access data network services, anytime and anywhere. According to the Internet of Things vision, interconnecting WSNs with smartphones and the Internet is a big challenge. Then, due to the heterogeneity of these devices new architectures are required. This dissertation focuses on the design and construction of a ubiquitous architecture for WSNs monitoring based on Web services, a relational database, and an Android mobile application. This architecture allows mobile users accessing real-time or historical data in a ubiquitous environment using smartphones. Besides that, a push notification system to alert mobile users when a sensor parameter overcomes a given threshold was created. The entire solution was evaluated and demonstrated using a laboratory WSN testbed, and is ready for use.As redes de sensores sem fios fazem parte de uma nova tendência tecnológica na qual pequenos dispositivos com recursos limitados comunicam entre si, sem fios, e interagem com o ambiente envolvente recolhendo uma grande diversidade de dados, tais como a temperatura e a humidade. Recentemente, devido ao enorme crescimento no uso de dispositivos móveis com ligação à Internet, os smartphones estão a tornar-se o centro das futuras redes sem fios ubíquas permitindo aos utilizadores aceder a dados, a qualquer hora e em qualquer lugar. De acordo com a visão da Internet of Things, interligar redes de sensores sem fios e smartphones usando a Internet é um grande desafio e novas arquitecturas são necessárias devido à heterogeneidade destes dispositivos. Esta dissertação centra-se na proposta e construção de uma arquitectura ubíqua para a monitorização de redes de sensores sem fios, baseada em serviços Web, apoiada numa base de dados relacional e uma aplicação móvel para o sistema operative Android. Esta arquitectura permite que os utilizadores móveis acedam a dados em tempo real e também a dados históricos, num ambiente móvel, usando smartphones. Além disso, foi desenvolvido um sistema de notificações push que alerta o utilizador quando um dado parâmetro de um sensor ultrapassa um limiar pré-definido. A solução construída foi testada e demonstrada utilizando uma testbed laboratorial e está pronta para utilização

    Path Reecovery in 6LoWPAN Routing Protocol

    Get PDF
    6LoWPAN has become a new technology to provide the Internetconnectivity to the traditional wireless sensor network (WSN). In order to route thedelivered packet from originator to destination nodes, the simplified Ad-hoc On-Demand Distance Vector (AODV) routing protocol for 6LoWPAN with 6LoWPANAd-Hoc On-Demand Distance Vector Routing (LOAD) has been introduced.However, the conceptual LOAD routing protocol has yet proposed any path recoverymechanism in 6LoWPAN. In this paper, an originator recognition (OR) path recoverymechanism is proposed for the 6LoWPAN LOAD-based routing protocol. In thisproposed mechanism, the participated nodes will memorize the originator addressattached within data packet during the data transmission. When a link break happenson destination path, the LOAD protocol message will be amended by inserting anidentity key, which is a memorial of originator address, in the generated route error(RERR) message before transmitted towards the originator for the failure notification.This identity key is then used by the originator to initialize path recovery in order toretransmit the failed data packet to the unreachable destination node. Instead of usingMAC address in the LOAD routing protocol, IP address is used in the proposedOriginator Recognition (OR) path recovery mechanism (OR-LOAD) routing protocolwhich is designed for the global routing. The proposed OR-LOAD routing protocolhas been examined under noisy 6LoWPAN environment in Qualnet simulator. Itsperformance is then evaluated and compared to AODV routing protocol in terms ofpacket delivery ratio and average energy consumption. The simulation results showthat the proposed OR-LOAD outperforms AODV with packet delivery ratio of 19.4%,and with comparable average energy consumption in both routing protocols

    Study and Optimized Simulation of OSPFv3 Routing Protocol in IPv6 Network

    Get PDF
    Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using 2018;cisco packet tracer2019;. 2018;Ping2019; the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment

    Management system for IPv6-enabled wireless sensor networks

    Get PDF
    “Copyright © [2011] IEEE. Reprinted from Internet of Things (iThings/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing. ISBN 978-1-4577-1976-9 This material is posted here with permission of the IEEE. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.”It is expected that in the near future smart objects will have an Internet connection – this is the Internet of Things vision. Most of these objects compatible with the IEEE 802.15.4 standard are characterized by small size, power constrains, and small computing resources. Connecting such devices to the Internet is considered simultaneously the biggest challenge and a great opportunity for the Internet growth. To achieve the Internet of things vision is necessary to support IPv6 protocol suite in all objects. Supporting IPv6 simplifies, simultaneously, the integration of these objects in the Internet and their management. Actually, despite of the relevance, there are no existing standard solutions to manage smart object networks. Managing this type of networks poses a unique challenge because smart object networks may be comprised of thousands of nodes, are highly dynamic and prone to failures. This paper presents a complete solution to manage smart object networks based on SNMPv1 protocol. The paper also presents the design and deployment of a laboratory testbed

    ENERGY AWARE ROUTING FOR WIRELESS SENSOR NETWORKS

    Get PDF
    Wireless sensor networks are used in improving conditions in the practical field and real life which lead researchers and developers to further research it and work into improving this field. These networks consist of sensor nodes that can help acquire data and information about temperature and pressure dependent on the environment of the location which are sent from. After all that, we are bounded by a really important factor which can determine everything which is Energy. Since sensor nodes send data and information to web applications, they need an energy source to operate. Their main energy source is their batteries which offer limited source of energy. Hence, various protocols are introduced to help in many parameters of a wireless sensor network such as increasing lifetime and decreasing consumption of energy, in other words, increasing the Energy Efficiency (EF). In this paper, we evaluate consumption of average energy for various protocols used in this context after each complete logical round for these protocols, such as Energy Efficient Clustering Scheme and Stable Election Protocol. Finally, we used Matlab tool to generate results which indicate that the protocol used in this paper is efficient and reliable

    IMPLEMENTATION AND OPTIMIZATION OF RWP MOBILITY MODEL IN WSNS UNDER TOSSIM SIMULATOR

    Get PDF
    Mobility has always represented a complicated phenomenon in the network routing process. This complexity is mainly facilitated in the way that ensures reliable connections for efficient orientation of data. Many years ago, different studies were initiated basing on routing protocols dedicated to static environments in order to adapt them to the mobile environment. In the present work, we have a different vision of mobility that has many advantages due to its 'mobile' principle. Indeed, instead of searching to prevent mobility and testing for example to immobilize momentarily a mobile environment to provide routing task, we will exploit this mobility to improve routing. Based on that, we carried out a set of works to achieve this objective. For our first contribution, we found that the best way to make use of this mobility is to follow a mobility model. Many models have been proposed in the literature and employed as a data source in most studies. After a careful study, we focused on the Random Waypoint mobility model (RWP) in order to ensure routing in wireless networks. Our contribution involves a Random Waypoint model (in its basic version) that was achieved on the TOSSIM simulator, and it was considered as a platform for our second (and main) contribution, in which we suggested an approach based RWP where network nodes can collaborate and work together basing on our recommended algorithm. Such an approach offers many advantages to ensure routing in a dynamic environment. Finally, our contributions comprise innovative ideas for suggesting other solutions that will improve them

    Denial of service mitigation approach for IPv6-enabled smart object networks

    Full text link
    Denial of service (DoS) attacks can be defined as any third-party action aiming to reduce or eliminate a network's capability to perform its expected functions. Although there are several standard techniques in traditional computing that mitigate the impact of some of the most common DoS attacks, this still remains a very important open problem to the network security community. DoS attacks are even more troublesome in smart object networks because of two main reasons. First, these devices cannot support the computational overhead required to implement many of the typical counterattack strategies. Second, low traffic rates are enough to drain sensors' battery energy making the network inoperable in short times. To realize the Internet of Things vision, it is necessary to integrate the smart objects into the Internet. This integration is considered an exceptional opportunity for Internet growth but, also, a security threat, because more attacks, including DoS, can be conducted. For these reasons, the prevention of DoS attacks is considered a hot topic in the wireless sensor networks scientific community. In this paper, an approach based on 6LowPAN neighbor discovery protocol is proposed to mitigate DoS attacks initiated from the Internet, without adding additional overhead on the 6LoWPAN sensor devices.This work has been partially supported by the Instituto de Telecomunicacoes, Next Generation Networks and Applications Group (NetGNA), Portugal, and by National Funding from the FCT - Fundacao para a Ciencia e Tecnologia through the Pest-OE/EEI/LA0008/2011.Oliveira, LML.; Rodrigues, JJPC.; De Sousa, AF.; Lloret, J. (2013). Denial of service mitigation approach for IPv6-enabled smart object networks. Concurrency and Computation: Practice and Experience. 25(1):129-142. doi:10.1002/cpe.2850S129142251Gershenfeld, N., Krikorian, R., & Cohen, D. (2004). The Internet of Things. Scientific American, 291(4), 76-81. doi:10.1038/scientificamerican1004-76Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38(4), 393-422. doi:10.1016/s1389-1286(01)00302-4Karl, H., & Willig, A. (2005). Protocols and Architectures for Wireless Sensor Networks. doi:10.1002/0470095121IEEE Std 802.15.4-2006 Part 15.4: wireless medium access control (MAC) and physical layer (PHY) specificationsfor low-rate wireless personal area networks (LR-WPANs) 2006ZigBee Alliance ZigBee Specification 2007WirelessHARThomepage 2012 http://www.hartcomm.org/Hui, J. W., & Culler, D. E. (2008). Extending IP to Low-Power, Wireless Personal Area Networks. IEEE Internet Computing, 12(4), 37-45. doi:10.1109/mic.2008.79Kushalnagar N Montenegro G Schumacher C IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals 2007Montenegro G Kushalnagar N Hui J Culler D Transmission of IPv6 Packets over IEEE 802.15.4 Networks 2007Shelby Z Thubert P Hui J Chakrabarti S Bormann C Nordmark E 6LoWPAN Neighbor Discovery 2011Zhou, L., Chao, H.-C., & Vasilakos, A. V. (2011). Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358-1367. doi:10.1109/jsac.2011.110803Roman, R., & Lopez, J. (2009). Integrating wireless sensor networks and the internet: a security analysis. Internet Research, 19(2), 246-259. doi:10.1108/10662240910952373Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2), 2-23. doi:10.1109/comst.2006.315852Xiaojiang Du, & Hsiao-Hwa Chen. (2008). Security in wireless sensor networks. IEEE Wireless Communications, 15(4), 60-66. doi:10.1109/mwc.2008.4599222Pelechrinis, K., Iliofotou, M., & Krishnamurthy, S. V. (2011). Denial of Service Attacks in Wireless Networks: The Case of Jammers. IEEE Communications Surveys & Tutorials, 13(2), 245-257. doi:10.1109/surv.2011.041110.00022Zhou, L., Wang, X., Tu, W., Muntean, G., & Geller, B. (2010). Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks. IEEE Journal on Selected Areas in Communications, 28(3), 409-419. doi:10.1109/jsac.2010.100412Lin, K., Lai, C.-F., Liu, X., & Guan, X. (2010). Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks. Mobile Networks and Applications, 17(1), 75-89. doi:10.1007/s11036-010-0287-xLi, H., Lin, K., & Li, K. (2011). Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Computer Communications, 34(4), 591-597. doi:10.1016/j.comcom.2010.02.026Oliveira, L. M. L., de Sousa, A. F., & Rodrigues, J. J. P. C. (2011). Routing and mobility approaches in IPv6 over LoWPAN mesh networks. International Journal of Communication Systems, 24(11), 1445-1466. doi:10.1002/dac.1228Narten T Nordmark E Simpson W Soliman H Neighbor Discovery for IP version 6 (IPv6) 2007Singh H Beebee W Nordmark E IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes 2010Roman, R., Lopez, J., & Gritzalis, S. (2008). Situation awareness mechanisms for wireless sensor networks. IEEE Communications Magazine, 46(4), 102-107. doi:10.1109/mcom.2008.4481348Sakarindr, P., & Ansari, N. (2007). Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. IEEE Wireless Communications, 14(5), 8-20. doi:10.1109/mwc.2007.4396938Tsao T Alexander R Dohler M Daza V Lozano A A Security Framework for Routing over Low Power and Lossy Networks 2009Karlof C Wagner D Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 2003 113 127 10.1109/SNPA.2003.1203362Hui J Thubert P Compression Format for IPv6 Datagrams in 6LoWPAN Networks 2009Elaine Shi, & Perrig, A. (2004). Designing Secure Sensor Networks. IEEE Wireless Communications, 11(6), 38-43. doi:10.1109/mwc.2004.1368895Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), 325-349. doi:10.1016/j.adhoc.2003.09.01

    An enhanced group mobility management method in wireless body area networks

    Get PDF
    Mobility management of wireless body area networks (WBANs) is an emerging key element in the healthcare system. The remote sensor nodes of WBAN are usually deployed on subjects’ body. Certain proxy mobile IPv6 (PMIP) methods have been recommended, however, PMIP is relatively impractical in group mobility management pertaining to WBAN. It is likely to cause enormous registration and handover interruptions. This paper presents an approach aims at overcome these limitations using improved group mobility management method. The method emphasizes on incorporation of authentication, authorization, and accounting (AAA) service into the local mobility anchor (LMA) as an alternative to independent practice. Furthermore, proxy binding update (PBU) and AAA inquiry messages are merged. Additionally, AAA response and proxy binding acknowledge (PBA) message are combined. The experiment results demonstrate that the proposed method outperforms the existing PMIP methods in terms of delay time for registration, the handover interruptions and the average signaling cost
    corecore