252 research outputs found

    An objective based classification of aggregation techniques for wireless sensor networks

    No full text
    Wireless Sensor Networks have gained immense popularity in recent years due to their ever increasing capabilities and wide range of critical applications. A huge body of research efforts has been dedicated to find ways to utilize limited resources of these sensor nodes in an efficient manner. One of the common ways to minimize energy consumption has been aggregation of input data. We note that every aggregation technique has an improvement objective to achieve with respect to the output it produces. Each technique is designed to achieve some target e.g. reduce data size, minimize transmission energy, enhance accuracy etc. This paper presents a comprehensive survey of aggregation techniques that can be used in distributed manner to improve lifetime and energy conservation of wireless sensor networks. Main contribution of this work is proposal of a novel classification of such techniques based on the type of improvement they offer when applied to WSNs. Due to the existence of a myriad of definitions of aggregation, we first review the meaning of term aggregation that can be applied to WSN. The concept is then associated with the proposed classes. Each class of techniques is divided into a number of subclasses and a brief literature review of related work in WSN for each of these is also presented

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks

    Get PDF
    Sensor networks are dense wireless networks constituting of small and low-cost sensors that collect and disseminate sensory data. They have gained great attention in recent years due to their ability to offer economical and effective solutions in a variety of fields; and their profound suitability to address mission critical problems that are common in health, transportation, and military applications. “Sensor networks” is a technology that is seen to change the world, and as such their deployment is expected to see a rapid growth. Effective security strategy is essential for any sensor network in order to maintain trustful and reliable functionality, protect sensory information, and ensure network component authenticity. Security models and protocols that are typically used in other types of networks, such as wired networks, are not suitable for sensor networks due to their specific hardware specifications. This thesis highlights some of the research done so far in the area of security of wireless sensor networks and proposes a solution to detect Byzantine behaviour - a challenging security threat that many sensor networks face. The proposed solution’s use of cryptography is kept at a minimum to ensure maximum secure bandwidth. Under this solution, a sensor network continues to work normally until an attack is suspected. Once an attack is suspected, a cryptography scheme is enabled to authenticate suspected nodes and to allow the identification of potential external attacks. If an attack seems to persist after the cryptography scheme has been enabled, the same mechanism is used to identify and isolate potentially compromised nodes. The goal is to introduce a degree of intelligence into such networks and consequently improve reliability of data collection, accuracy of aggregated data, and prolong network lifetime

    Architecture and communication protocol to monitor and control water quality and irrigation in agricultural environments

    Full text link
    [ES] La introducción de soluciones tecnológicas en la agricultura permite reducir el uso de recursos y aumentar la producción de los cultivos. Además, la calidad del agua de regadío se puede monitorizar para asegurar la seguridad de los productos para el consumo humano. Sin embargo, la localización remota de la mayoría de los campos presenta un problema para proveer de cobertura inalámbrica a los nodos sensores y actuadores desplegados en los campos y los canales de agua para regadío. El trabajo presentado en esta tesis aborda el problema de habilitar la comunicación inalámbrica entre los dispositivos electrónicos desplegados para la monitorización de la calidad del agua y el campo a través de un protocolo de comunicación y arquitectura heterogéneos. La primera parte de esta tesis introduce los sistemas de agricultura de precisión (PA) y la importancia de la monitorización de la calidad del agua y el campo. Asimismo, las tecnologías que permiten la comunicación inalámbrica en sistemas PA y el uso de soluciones alternativas como el internet de las cosas bajo tierra (IoUT) y los vehículos aéreos no tripulados (UAV) se introducen también. Después, se realiza un análisis en profundidad del estado del arte respecto a los sensores para la monitorización del agua, el campo y las condiciones meteorológicas, así como sobre las tecnologías inalámbricas más empleadas en PA. Además, las tendencias actuales y los desafíos de los sistemas de internet de las cosas (IoT) para regadío, incluyendo las soluciones alternativas introducidas anteriormente, han sido abordados en detalle. A continuación, se presenta la arquitectura propuesta para el sistema, la cual incluye las áreas de interés para las actividades monitorización que incluye las áreas de los canales y el campo. A su vez, la descripción y los algoritmos de operación de los nodos sensores contemplados para cada área son proporcionados. El siguiente capítulo detalla el protocolo de comunicación heterogéneo propuesto, incluyendo los mensajes y alertas del sistema. Adicionalmente, se presenta una nueva topología de árbol para redes híbridas LoRa/WiFi multisalto. Las funcionalidades específicas adicionales concebidas para la arquitectura propuesta están descritas en el siguiente capítulo. Éstas incluyen algoritmos de agregación de datos para la topología propuesta, un esquema de las amenazas de seguridad para los sistemas PA, algoritmos de ahorro de energía y tolerancia a fallos, comunicación bajo tierra para IoUT y el uso de drones para adquisición de datos. Después, los resultados de las simulaciones para las soluciones propuestas anteriormente son presentados. Finalmente, se tratan las pruebas realizadas en entornos reales para el protocolo heterogéneo presentado, las diferentes estrategias de despliegue de los nodos empleados, el consumo energético y la función de cuantificación de fruta. Estas pruebas demuestran la validez de la arquitectura y protocolo de comunicación heterogéneos que se han propuesto.[CA] La introducció de solucions tecnològiques en l'agricultura permet reduir l'ús de recursos i augmentar la producció dels cultius. A més, la qualitat de l'aigua de regadiu es pot monitoritzar per assegurar la qualitat dels productes per al consum humà. No obstant això, la localització remota de la majoria dels camps presenta un problema per a proveir de cobertura sense fils als nodes sensors i actuadors desplegats als camps i els canals d'aigua per a regadiu. El treball presentat en aquesta tesi tracta el problema d'habilitar la comunicació sense fils entre els dispositius electrònics desplegats per a la monitorització de la qualitat de l'aigua i el camp a través d'un protocol de comunicació i arquitectura heterogenis. La primera part d'aquesta tesi introdueix els sistemes d'agricultura de precisió (PA) i la importància de la monitorització de la qualitat de l'aigua i el camp. Així mateix, també s'introdueixen les tecnologies que permeten la comunicació sense fils en sistemes PA i l'ús de solucions alternatives com l'Internet de les coses sota terra (IoUT) i els vehicles aeris no tripulats (UAV). Després, es realitza una anàlisi en profunditat de l'estat de l'art respecte als sensors per a la monitorització de l'aigua, el camp i les condicions meteorològiques, així com sobre les tecnologies sense fils més emprades en PA. S'aborden les tendències actuals i els reptes dels sistemes d'internet de les coses (IoT) per a regadiu, incloent les solucions alternatives introduïdes anteriorment. A continuació, es presenta l'arquitectura proposada per al sistema, on s'inclouen les àrees d'interès per a les activitats monitorització en els canals i el camp. Finalment, es proporciona la descripció i els algoritmes d'operació dels nodes sensors contemplats per a cada àrea. El següent capítol detalla el protocol de comunicació heterogeni proposat, així como el disseny del missatges i alertes que el sistema proposa. A més, es presenta una nova topologia d'arbre per a xarxes híbrides Lora/WiFi multi-salt. Les funcionalitats específiques addicionals concebudes per l'arquitectura proposada estan descrites en el següent capítol. Aquestes inclouen algoritmes d'agregació de dades per a la topologia proposta, un esquema de les alertes de seguretat per als sistemes PA, algoritmes d'estalvi d'energia i tolerància a fallades, comunicació per a IoUT i l'ús de drons per a adquisició de dades. Després, es presenten els resultats de les simulacions per a les solucions proposades. Finalment, es duen a terme les proves en entorns reals per al protocol heterogeni dissenyat. A més s'expliquen les diferents estratègies de desplegament dels nodes empleats, el consum energètic, així com, la funció de quantificació de fruita. Els resultats d'aquetes proves demostren la validesa de l'arquitectura i protocol de comunicació heterogenis propost en aquesta tesi.[EN] The introduction of technological solutions in agriculture allows reducing the use of resources and increasing the production of the crops. Furthermore, the quality of the water for irrigation can be monitored to ensure the safety of the produce for human consumption. However, the remote location of most fields presents a problem for providing wireless coverage to the sensing nodes and actuators deployed on the fields and the irrigation water canals. The work presented in this thesis addresses the problem of enabling wireless communication among the electronic devices deployed for water quality and field monitoring through a heterogeneous communication protocol and architecture. The first part of the dissertation introduces Precision Agriculture (PA) systems and the importance of water quality and field monitoring. In addition, the technologies that enable wireless communication in PA systems and the use of alternative solutions such as Internet of Underground Things (IoUT) and Unmanned Aerial Vehicles (UAV) are introduced as well. Then, an in-depth analysis on the state of the art regarding the sensors for water, field and meteorology monitoring and the most utilized wireless technologies in PA is performed. Furthermore, the current trends and challenges for Internet of Things (IoT) irrigation systems, including the alternate solutions previously introduced, have been discussed in detail. Then, the architecture for the proposed system is presented, which includes the areas of interest for the monitoring activities comprised of the canal and field areas. Moreover, the description and operation algorithms of the sensor nodes contemplated for each area is provided. The next chapter details the proposed heterogeneous communication protocol including the messages and alerts of the system. Additionally, a new tree topology for hybrid LoRa/WiFi multi-hop networks is presented. The specific additional functionalities intended for the proposed architecture are described in the following chapter. It includes data aggregation algorithms for the proposed topology, an overview on the security threats of PA systems, energy-saving and fault-tolerance algorithms, underground communication for IoUT, and the use of drones for data acquisition. Then, the simulation results for the solutions previously proposed are presented. Finally, the tests performed in real environments for the presented heterogeneous protocol, the different deployment strategies for the utilized nodes, the energy consumption, and a functionality for fruit quantification are discussed. These tests demonstrate the validity of the proposed heterogeneous architecture and communication protocol.García García, L. (2021). Architecture and communication protocol to monitor and control water quality and irrigation in agricultural environments [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/17422

    Energy-Efficient Secure Routing in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks can provide low cost solution to verity of real-world problems. Sensors are low cost tiny devices with limited storage, computationalcapability and power. They can be deployed in large scale for performing both military and civilian tasks. Security will be one of the main concerned when they will be deployed in large scale. As sensors have limited power and computational apability, any security mechanism for sensor network must be energy e±cient and should not be computationalintensive. In this thesis we propose an energy-e±cient secure routing for wireless networks based on symmetric key cryptography. The proposed crypto system is session based and the session key is changed after the expire of each session. We divide the network into number of clusters and select a cluster head within each cluster.Communication between sensor and the sink takes place at the three level; sensor! cluster-head ! sink. Encryption of the sensed data is ransmitted to the cluster head, which aggregated the data received from the sensor nodes of its cluster before forwarding to the next cluster head on the path or to the sink . Sensors do not participate in the routing scheme; their energy is conserved at each sensor node

    Mitigating Denial of Service Attacks in Fog-Based Wireless Sensor Networks Using Machine Learning Techniques

    Full text link
    Wireless sensor networks are considered to be among the most significant and innovative technologies in the 21st century due to their wide range of industrial applications. Sensor nodes in these networks are susceptible to a variety of assaults due to their special qualities and method of deployment. In WSNs, denial of service attacks are common attacks in sensor networks. It is difficult to design a detection and prevention system that would effectively reduce the impact of these attacks on WSNs. In order to identify assaults on WSNs, this study suggests using two machine learning models: decision trees and XGBoost. The WSNs dataset was the subject of extensive tests to identify denial of service attacks. The experimental findings demonstrate that the XGBoost model, when applied to the entire dataset, has a higher true positive rate (98.3%) than the Decision tree approach (97.3%) and a lower false positive rate (1.7%) than the Decision tree technique (2.7%). Like this, with selected dataset assaults, the XGBoost approach has a higher true positive rate (99.01%) than the Decision tree technique (97.50%) and a lower false positive rate (0.99%) than the Decision tree technique (2.50%)

    Secure and Private Data Aggregation in WSN

    Get PDF
    Data aggregation is an important efficiency mechanism for large scale, resource constrained networks such as wireless sensor networks (WSN). Security and privacy are central for many data aggregation applications: (1) entities make decisions based on the results of the data aggregation, so the entities need to be assured that the aggregation process and in particular the aggregate data they receive has not been corrupted (i.e., verify the integrity of the aggregation); (2) If the aggregation application has been attacked, then the attack must be handled efficiently; (3) the privacy requirements of the sensor network must be preserved. The nature of both wireless sensor networks and data aggregation make it particularly challenging to provide the desired security and privacy requirements: (1) sensors in WSN can be easily compromised and subsequently corrupted by an adversary since they are unmonitored and have little physical security; (2) a malicious aggregator node at the root of an aggregation subtree can corrupt not just its own value but also that of all the nodes in its entire aggregation subtree; (3) since sensors have limited resourced, it is crucial to achieve the security objectives while adopting only cheap symmetric-key based operations and minimizing communication cost. In this thesis, we first address the problem of efficient handling of adversarial attacks on data aggregation applications in WSN. We propose and analyze a detection and identification solution, presenting a precise cost-based characterization when in-network data aggregation retains its assumed benefits under persistent attacks. Second, we address the issue of data privacy in WSN in the context of data aggregation. We introduce and analyze the problem of privacy-preserving integrity-assured data aggregation (PIA) and show that there is an inherent tension between preservation of data privacy and secure data aggregation. Additionally, we look at the problem of PIA in publish-subscribe networks when there are multiple, collaborative yet competing subscribers

    Enhancing Energy Efficiency and Privacy Protection of Smart Devices

    Get PDF
    Smart devices are experiencing rapid development and great popularity. Various smart products available nowadays have largely enriched people’s lives. While users are enjoying their smart devices, there are two major user concerns: energy efficiency and privacy protection. In this dissertation, we propose solutions to enhance energy efficiency and privacy protection on smart devices. First, we study different ways to handle WiFi broadcast frames during smartphone suspend mode. We reveal the dilemma of existing methods: either receive all of them suffering high power consumption, or receive none of them sacrificing functionalities. to address the dilemma, we propose Software Broadcast Filter (SBF). SBF is smarter than the “receive-none” method as it only blocks useless broadcast frames and does not impair application functionalities. SBF is also more energy efficient than the “receive-all” method. Our trace driven evaluation shows that SBF saves up to 49.9% energy consumption compared to the “receive-all” method. Second, we design a system, namely HIDE, to further reduce smartphone energy wasted on useless WiFi broadcast frames. With the HIDE system, smartphones in suspend mode do not receive useless broadcast frames or wake up to process use- less broadcast frames. Our trace-driven simulation shows that the HIDE system saves 34%-75% energy for the Nexus One phone when 10% of the broadcast frames are useful to the smartphone. Our overhead analysis demonstrates that the HIDE system has negligible impact on network capacity and packet round-trip time. Third, to better protect user privacy, we propose a continuous and non-invasive authentication system for wearable glasses, namely GlassGuard. GlassGuard discriminates the owner and an imposter with biometric features from touch gestures and voice commands, which are all available during normal user interactions. With data collected from 32 users on Google Glass, we show that GlassGuard achieves a 99% detection rate and a 0.5% false alarm rate after 3.5 user events on average when all types of user events are available with equal probability. Under five typical usage scenarios, the system has a detection rate above 93% and a false alarm rate below 3% after less than 5 user events
    corecore