13,162 research outputs found

    Secured Clustering in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are being increasingly used in a wide variety of applications such as the environment, nuclear power plants, military and transportation, to name a few. These sensors are fragile devices, with minimal energy, storage and computational resources. The phenomenon that is sensed is relayed to a powerful base station for further analysis. A key issue in the design of communication protocols for wireless sensor networks is energy conservation. Another important criterion for sensor networks is security. This is particularly important in military applications and national infrastructure such as power plants and transportation systems. As far as we are aware, no protocols have been proposed for energy efficient secure communications. In previous work both security and energy efficiency have been considered separately in the design of protocols for sensor networks. In this thesis we propose a secure energy efficient communication protocol for wireless sensor networks. A clustered protocol based on "A key-management scheme for distributed sensor networks" proposed by V.D. Gligor is developed and simulated in this thesis. To further improve energy efficiency we apply the concept of a force to improve the coverage of the sensor nodes. The properties of our proposed algorithm have been analyzed. We propose in this thesis a secure scheme with clustering, a balanced secure scheme with clustering and finally a balanced clustered secure scheme after the application of force. Results show that the proposed balanced clustered secure scheme after the application of force provides the best energy efficiency as well as security. The secure scheme with no clustering gave the worst results.Computer Science Departmen

    On the vulnerabilities of voronoi-based approaches to mobile sensor deployment

    Get PDF
    Mobile sensor networks are the most promising solution to cover an Area of Interest (AoI) in safety critical scenarios. Mobile devices can coordinate with each other according to a distributed deployment algorithm, without resorting to human supervision for device positioning and network configuration. In this paper, we focus on the vulnerabilities of the deployment algorithms based on Voronoi diagrams to coordinate mobile sensors and guide their movements. We give a geometric characterization of possible attack configurations, proving that a simple attack consisting of a barrier of few compromised sensors can severely reduce network coverage. On the basis of the above characterization, we propose two new secure deployment algorithms, named SecureVor and Secure Swap Deployment (SSD). These algorithms allow a sensor to detect compromised nodes by analyzing their movements, under different and complementary operative settings. We show that the proposed algorithms are effective in defeating a barrier attack, and both have guaranteed termination. We perform extensive simulations to study the performance of the two algorithms and compare them with the original approach. Results show that SecureVor and SSD have better robustness and flexibility and excellent coverage capabilities and deployment time, even in the presence of an attac

    Securing the Internet of Things Infrastructure - Standards and Techniques

    Get PDF
    The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed
    corecore