3 research outputs found

    A secure over-the-air programming scheme in wireless sensor networks

    Get PDF
    Over-The-Air dissemination of code updates in Wireless Sensor Networks (WSNs) have been researchers’ point of interest in past a few years and more importantly security challenges toward remote propagation of code update have taken the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strengthen with having their concentration on constraint nature of WSN nodes. For authentication purposes most of them have used Merkle-Hash-Tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be in a standard level and therefore they have not investigated the tree structure for mission-critical situations in which security has to be in maximum possible extent (e.g. military zones). Two major problems have been identified in Merkle Tree structure which is used in Seluge scheme, including: 1) an exponential growth in number of overhead packets when block size of hash algorithm used in design is increased. 2) Limitation of using hash algorithms with larger block size of 11 bytes when payload size is set to 72 bytes. Then several existing security models are investigated for possible vulnerabilities and a set of countermeasures correspondingly named Security Model Requirements (SMR) is provided. After concentrating on Seluge’s design, a new secure Over-The-Air Programming (OTAP) scheme named Seluge++ is proposed that complies with SMR and replaces the use of inefficient Merkle Tree with a novel method

    Improvement of a three-tier wireless sensor network for environment monitoring

    Get PDF
    Doctor of PhilosophyDepartment of Biological & Agricultural EngineeringNaiqian ZhangA three-tier wireless sensor network (WSN) was developed and deployed to remotely monitor suspended sediment concentration and stream velocity in real-time. Two years of field experiments have demonstrated the achievement of such capabilities. But several weak points emerged and required essential performance improvement and additional research on the radio propagation mechanism within the original three-tier WSN. In the original three-tier WSN, long time delay, potential data loss, and limited network throughput all restricted the network transmission performance. Upon the above issues, the transmission delay was reduced through shortening the raw data storage buffer and the data packet length; the data loss rate was decreased by adopting a mechanism using semaphores and adding feedback after data transmission; the network throughput was enlarged through the event- and time-driven scheduling method. In order to find a long-range wireless transmission method as an alternative to the commercial cellular service used in the original WSN, a central station using meteor burst communication (MBC) technology was developed and deployed. During an 8-month field test, it was capable of performing long distance communication with a low data loss rate and transmission error rate. But due to unstable availability of the meteor trails, the MBC network throughput was constrained. To reduce in-situ maintenance, over-the-air programming was implemented. Thus, programs running in the central station and the gateway station can be updated remotely. To investigate the radio propagation in densely vegetative areas, a 2.4 GHz radio propagation path loss model was derived to predict the short-range path loss from the path loss in the open area and the path loss due to dense vegetation. In addition, field experiments demonstrated that ambient air temperature, relative humidity, and heavy rainfall could also affect wireless signal strength
    corecore