692 research outputs found

    NECESSITY TO SECURE WIRELESS SENSOR NETWORK

    Get PDF
    Wireless sensor networks are often deployed in hostile and unattended environments. The nodes will be failure by fault, intrusion and battery exhaustion. Node - failure tolerance is an acceptable method to improve the networks lifetime. In this paper, two key problems for topology control are presented: first, how to get a node - failure topology when there is intrusion from the nodes of hostile enemies? Secondly , how to sustain this node - failure topology with all deployed node s being exhausted ultimately? Here we suggest a novel approach for topology control and prove that it is node - failure tolerant. The approach contains three phases: topology discovery, topology update, and topology regeneration. A tricolor - based method is proposed to build architecture with high tolerance ability and some security protocols are employed to preclude the hostile nodes in discovery phase. In update and regeneration phases, the newly deployed nodes are regarded as renewable resource to fill in the consumed energy, enhance the debased node - failure tolerance ability, prolong network lifetime d . A security protocol with forward and backward secrecy is devised to adapt the topology changed by node failure and node joining. Some attributes of the presented method are shown by simulations, and differences a re given by comparison with related work

    RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN

    Get PDF
    In the real application environment of wireless sensor networks (WSNs), the uncertain factor of data storage makes the authentication information be easily forged and destroyed by illegal attackers. As a result, it is hard for secure managers to conduct forensics on transmitted information in WSN. This work considers the regeneration encoding self-healing and secret sharing techniques and proposes an effective scheme to authenticate data in WSN. The data is encoded by regeneration codes and then distributed to other redundant nodes in the form of fragments. When the network is attacked, the scheme has the ability against tampering attack or collusion attack. Furthermore, the damaged fragments can be restored as well. Parts of fragments, encoded by regeneration code, are required for secure authentication of the original distributed data. Experimental results show that the proposed scheme reduces hardware communication overhead by five percent in comparison. Additionally, the performance of local recovery achieves ninety percent

    Hunting the hunters:Wildlife Monitoring System

    Get PDF

    Architecture and communication protocol to monitor and control water quality and irrigation in agricultural environments

    Full text link
    [ES] La introducción de soluciones tecnológicas en la agricultura permite reducir el uso de recursos y aumentar la producción de los cultivos. Además, la calidad del agua de regadío se puede monitorizar para asegurar la seguridad de los productos para el consumo humano. Sin embargo, la localización remota de la mayoría de los campos presenta un problema para proveer de cobertura inalámbrica a los nodos sensores y actuadores desplegados en los campos y los canales de agua para regadío. El trabajo presentado en esta tesis aborda el problema de habilitar la comunicación inalámbrica entre los dispositivos electrónicos desplegados para la monitorización de la calidad del agua y el campo a través de un protocolo de comunicación y arquitectura heterogéneos. La primera parte de esta tesis introduce los sistemas de agricultura de precisión (PA) y la importancia de la monitorización de la calidad del agua y el campo. Asimismo, las tecnologías que permiten la comunicación inalámbrica en sistemas PA y el uso de soluciones alternativas como el internet de las cosas bajo tierra (IoUT) y los vehículos aéreos no tripulados (UAV) se introducen también. Después, se realiza un análisis en profundidad del estado del arte respecto a los sensores para la monitorización del agua, el campo y las condiciones meteorológicas, así como sobre las tecnologías inalámbricas más empleadas en PA. Además, las tendencias actuales y los desafíos de los sistemas de internet de las cosas (IoT) para regadío, incluyendo las soluciones alternativas introducidas anteriormente, han sido abordados en detalle. A continuación, se presenta la arquitectura propuesta para el sistema, la cual incluye las áreas de interés para las actividades monitorización que incluye las áreas de los canales y el campo. A su vez, la descripción y los algoritmos de operación de los nodos sensores contemplados para cada área son proporcionados. El siguiente capítulo detalla el protocolo de comunicación heterogéneo propuesto, incluyendo los mensajes y alertas del sistema. Adicionalmente, se presenta una nueva topología de árbol para redes híbridas LoRa/WiFi multisalto. Las funcionalidades específicas adicionales concebidas para la arquitectura propuesta están descritas en el siguiente capítulo. Éstas incluyen algoritmos de agregación de datos para la topología propuesta, un esquema de las amenazas de seguridad para los sistemas PA, algoritmos de ahorro de energía y tolerancia a fallos, comunicación bajo tierra para IoUT y el uso de drones para adquisición de datos. Después, los resultados de las simulaciones para las soluciones propuestas anteriormente son presentados. Finalmente, se tratan las pruebas realizadas en entornos reales para el protocolo heterogéneo presentado, las diferentes estrategias de despliegue de los nodos empleados, el consumo energético y la función de cuantificación de fruta. Estas pruebas demuestran la validez de la arquitectura y protocolo de comunicación heterogéneos que se han propuesto.[CA] La introducció de solucions tecnològiques en l'agricultura permet reduir l'ús de recursos i augmentar la producció dels cultius. A més, la qualitat de l'aigua de regadiu es pot monitoritzar per assegurar la qualitat dels productes per al consum humà. No obstant això, la localització remota de la majoria dels camps presenta un problema per a proveir de cobertura sense fils als nodes sensors i actuadors desplegats als camps i els canals d'aigua per a regadiu. El treball presentat en aquesta tesi tracta el problema d'habilitar la comunicació sense fils entre els dispositius electrònics desplegats per a la monitorització de la qualitat de l'aigua i el camp a través d'un protocol de comunicació i arquitectura heterogenis. La primera part d'aquesta tesi introdueix els sistemes d'agricultura de precisió (PA) i la importància de la monitorització de la qualitat de l'aigua i el camp. Així mateix, també s'introdueixen les tecnologies que permeten la comunicació sense fils en sistemes PA i l'ús de solucions alternatives com l'Internet de les coses sota terra (IoUT) i els vehicles aeris no tripulats (UAV). Després, es realitza una anàlisi en profunditat de l'estat de l'art respecte als sensors per a la monitorització de l'aigua, el camp i les condicions meteorològiques, així com sobre les tecnologies sense fils més emprades en PA. S'aborden les tendències actuals i els reptes dels sistemes d'internet de les coses (IoT) per a regadiu, incloent les solucions alternatives introduïdes anteriorment. A continuació, es presenta l'arquitectura proposada per al sistema, on s'inclouen les àrees d'interès per a les activitats monitorització en els canals i el camp. Finalment, es proporciona la descripció i els algoritmes d'operació dels nodes sensors contemplats per a cada àrea. El següent capítol detalla el protocol de comunicació heterogeni proposat, així como el disseny del missatges i alertes que el sistema proposa. A més, es presenta una nova topologia d'arbre per a xarxes híbrides Lora/WiFi multi-salt. Les funcionalitats específiques addicionals concebudes per l'arquitectura proposada estan descrites en el següent capítol. Aquestes inclouen algoritmes d'agregació de dades per a la topologia proposta, un esquema de les alertes de seguretat per als sistemes PA, algoritmes d'estalvi d'energia i tolerància a fallades, comunicació per a IoUT i l'ús de drons per a adquisició de dades. Després, es presenten els resultats de les simulacions per a les solucions proposades. Finalment, es duen a terme les proves en entorns reals per al protocol heterogeni dissenyat. A més s'expliquen les diferents estratègies de desplegament dels nodes empleats, el consum energètic, així com, la funció de quantificació de fruita. Els resultats d'aquetes proves demostren la validesa de l'arquitectura i protocol de comunicació heterogenis propost en aquesta tesi.[EN] The introduction of technological solutions in agriculture allows reducing the use of resources and increasing the production of the crops. Furthermore, the quality of the water for irrigation can be monitored to ensure the safety of the produce for human consumption. However, the remote location of most fields presents a problem for providing wireless coverage to the sensing nodes and actuators deployed on the fields and the irrigation water canals. The work presented in this thesis addresses the problem of enabling wireless communication among the electronic devices deployed for water quality and field monitoring through a heterogeneous communication protocol and architecture. The first part of the dissertation introduces Precision Agriculture (PA) systems and the importance of water quality and field monitoring. In addition, the technologies that enable wireless communication in PA systems and the use of alternative solutions such as Internet of Underground Things (IoUT) and Unmanned Aerial Vehicles (UAV) are introduced as well. Then, an in-depth analysis on the state of the art regarding the sensors for water, field and meteorology monitoring and the most utilized wireless technologies in PA is performed. Furthermore, the current trends and challenges for Internet of Things (IoT) irrigation systems, including the alternate solutions previously introduced, have been discussed in detail. Then, the architecture for the proposed system is presented, which includes the areas of interest for the monitoring activities comprised of the canal and field areas. Moreover, the description and operation algorithms of the sensor nodes contemplated for each area is provided. The next chapter details the proposed heterogeneous communication protocol including the messages and alerts of the system. Additionally, a new tree topology for hybrid LoRa/WiFi multi-hop networks is presented. The specific additional functionalities intended for the proposed architecture are described in the following chapter. It includes data aggregation algorithms for the proposed topology, an overview on the security threats of PA systems, energy-saving and fault-tolerance algorithms, underground communication for IoUT, and the use of drones for data acquisition. Then, the simulation results for the solutions previously proposed are presented. Finally, the tests performed in real environments for the presented heterogeneous protocol, the different deployment strategies for the utilized nodes, the energy consumption, and a functionality for fruit quantification are discussed. These tests demonstrate the validity of the proposed heterogeneous architecture and communication protocol.García García, L. (2021). Architecture and communication protocol to monitor and control water quality and irrigation in agricultural environments [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/17422

    AR-RBFS: Aware-Routing Protocol Based on Recursive Best-First Search Algorithm for Wireless Sensor Networks

    Get PDF
    Energy issue is one of the most important problems in wireless sensor networks. They consist of low-power sensor nodes and a few base station nodes. They must be adaptive and efficient in data transmission to sink in various areas. This paper proposes an aware-routing protocol based on clustering and recursive search approaches. The paper focuses on the energy efficiency issue with various measures such as prolonging network lifetime along with reducing energy consumption in the sensor nodes and increasing the system reliability. Our proposed protocol consists of two phases. In the first phase (network development phase), the sensors are placed into virtual layers. The second phase (data transmission) is related to routes discovery and data transferring so it is based on virtual-based Classic-RBFS algorithm in the lake of energy problem environments but, in the nonchargeable environments, all nodes in each layer can be modeled as a random graph and then begin to be managed by the duty cycle method. Additionally, the protocol uses new topology control, data aggregation, and sleep/wake-up schemas for energy saving in the network. The simulation results show that the proposed protocol is optimal in the network lifetime and packet delivery parameters according to the present protocols

    A PROTOCOL SUITE FOR WIRELESS PERSONAL AREA NETWORKS

    Get PDF
    A Wireless Personal Area Network (WPAN) is an ad hoc network that consists of devices that surround an individual or an object. Bluetooth® technology is especially suitable for formation of WPANs due to the pervasiveness of devices with Bluetooth® chipsets, its operation in the unlicensed Industrial, Scientific, Medical (ISM) frequency band, and its interference resilience. Bluetooth® technology has great potential to become the de facto standard for communication between heterogeneous devices in WPANs. The piconet, which is the basic Bluetooth® networking unit, utilizes a Master/Slave (MS) configuration that permits only a single master and up to seven active slave devices. This structure limitation prevents Bluetooth® devices from directly participating in larger Mobile Ad Hoc Networks (MANETs) and Wireless Personal Area Networks (WPANs). In order to build larger Bluetooth® topologies, called scatternets, individual piconets must be interconnected. Since each piconet has a unique frequency hopping sequence, piconet interconnections are done by allowing some nodes, called bridges, to participate in more than one piconet. These bridge nodes divide their time between piconets by switching between Frequency Hopping (FH) channels and synchronizing to the piconet\u27s master. In this dissertation we address scatternet formation, routing, and security to make Bluetooth® scatternet communication feasible. We define criteria for efficient scatternet topologies, describe characteristics of different scatternet topology models as well as compare and contrast their properties, classify existing scatternet formation approaches based on the aforementioned models, and propose a distributed scatternet formation algorithm that efficiently forms a scatternet topology and is resilient to node failures. We propose a hybrid routing algorithm, using a bridge link agnostic approach, that provides on-demand discovery of destination devices by their address or by the services that devices provide to their peers, by extending the Service Discovery Protocol (SDP) to scatternets. We also propose a link level security scheme that provides secure communication between adjacent piconet masters, within what we call an Extended Scatternet Neighborhood (ESN)

    7. GI/ITG KuVS Fachgespräch Drahtlose Sensornetze

    Get PDF
    In dem vorliegenden Tagungsband sind die Beiträge des Fachgesprächs Drahtlose Sensornetze 2008 zusammengefasst. Ziel dieses Fachgesprächs ist es, Wissenschaftlerinnen und Wissenschaftler aus diesem Gebiet die Möglichkeit zu einem informellen Austausch zu geben – wobei immer auch Teilnehmer aus der Industrieforschung willkommen sind, die auch in diesem Jahr wieder teilnehmen.Das Fachgespräch ist eine betont informelle Veranstaltung der GI/ITG-Fachgruppe „Kommunikation und Verteilte Systeme“ (www.kuvs.de). Es ist ausdrücklich keine weitere Konferenz mit ihrem großen Overhead und der Anforderung, fertige und möglichst „wasserdichte“ Ergebnisse zu präsentieren, sondern es dient auch ganz explizit dazu, mit Neueinsteigern auf der Suche nach ihrem Thema zu diskutieren und herauszufinden, wo die Herausforderungen an die zukünftige Forschung überhaupt liegen.Das Fachgespräch Drahtlose Sensornetze 2008 findet in Berlin statt, in den Räumen der Freien Universität Berlin, aber in Kooperation mit der ScatterWeb GmbH. Auch dies ein Novum, es zeigt, dass das Fachgespräch doch deutlich mehr als nur ein nettes Beisammensein unter einem Motto ist.Für die Organisation des Rahmens und der Abendveranstaltung gebührt Dank den beiden Mitgliedern im Organisationskomitee, Kirsten Terfloth und Georg Wittenburg, aber auch Stefanie Bahe, welche die redaktionelle Betreuung des Tagungsbands übernommen hat, vielen anderen Mitgliedern der AG Technische Informatik der FU Berlin und natürlich auch ihrem Leiter, Prof. Jochen Schiller

    Robust and cheating-resilient power auctioning on Resource Constrained Smart Micro-Grids

    Get PDF
    The principle of Continuous Double Auctioning (CDA) is known to provide an efficient way of matching supply and demand among distributed selfish participants with limited information. However, the literature indicates that the classic CDA algorithms developed for grid-like applications are centralised and insensitive to the processing resources capacity, which poses a hindrance for their application on resource constrained, smart micro-grids (RCSMG). A RCSMG loosely describes a micro-grid with distributed generators and demand controlled by selfish participants with limited information, power storage capacity and low literacy, communicate over an unreliable infrastructure burdened by limited bandwidth and low computational power of devices. In this thesis, we design and evaluate a CDA algorithm for power allocation in a RCSMG. Specifically, we offer the following contributions towards power auctioning on RCSMGs. First, we extend the original CDA scheme to enable decentralised auctioning. We do this by integrating a token-based, mutual-exclusion (MUTEX) distributive primitive, that ensures the CDA operates at a reasonably efficient time and message complexity of O(N) and O(logN) respectively, per critical section invocation (auction market execution). Our CDA algorithm scales better and avoids the single point of failure problem associated with centralised CDAs (which could be used to adversarially provoke a break-down of the grid marketing mechanism). In addition, the decentralised approach in our algorithm can help eliminate privacy and security concerns associated with centralised CDAs. Second, to handle CDA performance issues due to malfunctioning devices on an unreliable network (such as a lossy network), we extend our proposed CDA scheme to ensure robustness to failure. Using node redundancy, we modify the MUTEX protocol supporting our CDA algorithm to handle fail-stop and some Byzantine type faults of sites. This yields a time complexity of O(N), where N is number of cluster-head nodes; and message complexity of O((logN)+W) time, where W is the number of check-pointing messages. These results indicate that it is possible to add fault tolerance to a decentralised CDA, which guarantees continued participation in the auction while retaining reasonable performance overheads. In addition, we propose a decentralised consumption scheduling scheme that complements the auctioning scheme in guaranteeing successful power allocation within the RCSMG. Third, since grid participants are self-interested we must consider the issue of power theft that is provoked when participants cheat. We propose threat models centred on cheating attacks aimed at foiling the extended CDA scheme. More specifically, we focus on the Victim Strategy Downgrade; Collusion by Dynamic Strategy Change, Profiling with Market Prediction; and Strategy Manipulation cheating attacks, which are carried out by internal adversaries (auction participants). Internal adversaries are participants who want to get more benefits but have no interest in provoking a breakdown of the grid. However, their behaviour is dangerous because it could result in a breakdown of the grid. Fourth, to mitigate these cheating attacks, we propose an exception handling (EH) scheme, where sentinel agents use allocative efficiency and message overheads to detect and mitigate cheating forms. Sentinel agents are tasked to monitor trading agents to detect cheating and reprimand the misbehaving participant. Overall, message complexity expected in light demand is O(nLogN). The detection and resolution algorithm is expected to run in linear time complexity O(M). Overall, the main aim of our study is achieved by designing a resilient and cheating-free CDA algorithm that is scalable and performs well on resource constrained micro-grids. With the growing popularity of the CDA and its resource allocation applications, specifically to low resourced micro-grids, this thesis highlights further avenues for future research. First, we intend to extend the decentralised CDA algorithm to allow for participants’ mobile phones to connect (reconnect) at different shared smart meters. Such mobility should guarantee the desired CDA properties, the reliability and adequate security. Secondly, we seek to develop a simulation of the decentralised CDA based on the formal proofs presented in this thesis. Such a simulation platform can be used for future studies that involve decentralised CDAs. Third, we seek to find an optimal and efficient way in which the decentralised CDA and the scheduling algorithm can be integrated and deployed in a low resourced, smart micro-grid. Such an integration is important for system developers interested in exploiting the benefits of the two schemes while maintaining system efficiency. Forth, we aim to improve on the cheating detection and mitigation mechanism by developing an intrusion tolerance protocol. Such a scheme will allow continued auctioning in the presence of cheating attacks while incurring low performance overheads for applicability in a RCSMG
    corecore