6 research outputs found

    Ensuring Security Using Core Based Routing Algorithm In Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSNs) circulate hundreds to thousands of modest miniaturized scale sensor hubs in their locales and these hubs are vital parts of Internet of Things (IoT). In WSN-helped IoT, the hubs are asset obliged from multiple points of view, for example, stockpiling assets, figuring assets, vitality assets, et cetera. Powerful steering conventions are required to keep up a long system lifetime and accomplish higher vitality use. To upgrade WSNs for secured data transmission both at group head and base station data aggregation is required. Data aggregation is performed in each switch while sending data. The life time of sensor arranges lessens in view of utilizing vitality wasteful hubs for data aggregation. Thus aggregation process in WSN ought to be upgraded in vitality proficient way. ESCR will enhance the performance of the system with good potential. Therefore ensuring security using core based routing (ESCR) algorithm in WSNs is proposed. Simulation results show that ESCR perform better than the existing algorithms

    On Evaluating the Performance Impact of the IEEE 802.15.4 Security Sub-layer

    Get PDF
    Nowadays, wireless sensor networks (WSNs) are used in a wide range of application scenarios ranging from structural monitoring to health-care, from surveillance to industrial automation. Most of these applications require forms of secure communication. On the other hand, security has a cost in terms of reduced performance. In this paper we refer to the IEEE 802.15.4 standard and investigate the impact of the 802.15.4 security sub-layer on the WSN performance. Specifically, we analyze the impact that security mechanisms and options, as provided by the standard, have on the overall WSN performance, in terms of latency, goodput, and energy consumption. To this end, we develop an analytical model and a security enabled simulator. We also use a real testbed, based on a complete open-source implementation of the standard, to validate simulation and analytical results, as well as to better understand the limits of the current WSN technology

    Overlay virtualized wireless sensor networks for application in industrial internet of things : a review

    Get PDF
    Abstract: In recent times, Wireless Sensor Networks (WSNs) are broadly applied in the Industrial Internet of Things (IIoT) in order to enhance the productivity and efficiency of existing and prospective manufacturing industries. In particular, an area of interest that concerns the use of WSNs in IIoT is the concept of sensor network virtualization and overlay networks. Both network virtualization and overlay networks are considered contemporary because they provide the capacity to create services and applications at the edge of existing virtual networks without changing the underlying infrastructure. This capability makes both network virtualization and overlay network services highly beneficial, particularly for the dynamic needs of IIoT based applications such as in smart industry applications, smart city, and smart home applications. Consequently, the study of both WSN virtualization and overlay networks has become highly patronized in the literature, leading to the growth and maturity of the research area. In line with this growth, this paper provides a review of the development made thus far concerning virtualized sensor networks, with emphasis on the application of overlay networks in IIoT. Principally, the process of virtualization in WSN is discussed along with its importance in IIoT applications. Different challenges in WSN are also presented along with possible solutions given by the use of virtualized WSNs. Further details are also presented concerning the use of overlay networks as the next step to supporting virtualization in shared sensor networks. Our discussion closes with an exposition of the existing challenges in the use of virtualized WSN for IIoT applications. In general, because overlay networks will be contributory to the future development and advancement of smart industrial and smart city applications, this review may be considered by researchers as a reference point for those particularly interested in the study of this growing field

    Efficient Elliptic Curve Cryptography Software Implementation on Embedded Platforms

    Get PDF

    Performance Evaluation of Security Solutions for Wireless Sensor Networks

    Get PDF
    In the recent years, wireless communication is involving not only computers, but a multitude of heterogeneous devices. Wireless Sensor Networks (WSNs) contribute to the new paradigm of pervasive computing, and this translates into new requirements for new applications. WSNs are employed not only on their own, but also in Cooperating Objects Systems (COSs), where mobile physical agents share the same environment to fulfill their tasks, either in group or in isolation. Sensor nodes are typically resource constrained devices deployed in unattended, possibly hostile environments. WSNs and COSs are a tempting target for an adversary, since a security infringement may easily translate into a safety one, with possible consequences in terms of damages to things and injures to people. Main security requirements for WSNs are secure communication, key management and secure bootstrapping. Security usually involves resource greedy operations, while sensors are resource constrained devices. This means that security requirements must be satisfied assuring a lightweight impact in terms of memory occupancy, network performance and energy consumption. In this thesis work, we start from a performance evaluation of the security sublayer of the IEEE 802.15.4 standard in terms of memory occupancy, network performance and energy consumption. Then, present and evaluate a solution to a vulnerability of the IEEE 802.15.4 standard that causes a selective Denial of Service attack. Finally, we present PLASA: a modular and reconfigurable security architecture for WSNs. PLASA extends the STaR architecture. STaR is a secure communication module we designed to provide confidentiality and/or authenticity of communications in a trans- parent and flexible manner. PLASA enhances STaR, introducing modules for key management and secure bootstrapping, so providing a complete system that is suitable not only for the WSN, but for the entire COS
    corecore