1,109 research outputs found

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    Enhancing Security and Energy Efficiency in Wireless Sensor Network Routing with IOT Challenges: A Thorough Review

    Get PDF
    Wireless sensor networks (WSNs) have emerged as a crucial component in the field of networking due to their cost-effectiveness, efficiency, and compact size, making them invaluable for various applications. However, as the reliance on WSN-dependent applications continues to grow, these networks grapple with inherent limitations such as memory and computational constraints. Therefore, effective solutions require immediate attention, especially in the age of the Internet of Things (IoT), which largely relies on the effectiveness of WSNs. This study undertakes a comprehensive review of research conducted between 2018 and 2020, categorizing it into six main domains: 1) Providing an overview of WSN applications, management, and security considerations. 2) Focusing on routing and energy-saving techniques. 3) Reviewing the development of methods for information gathering, emphasizing data integrity and privacy. 4) Emphasizing connectivity and positioning techniques. 5) Examining studies that explore the integration of IoT technology into WSNs with an eye on secure data transmission. 6) Highlighting research efforts aimed at energy efficiency. The study addresses the motivation behind employing WSN applications in IoT technologies, as well as the challenges, obstructions, and solutions related to their application and development. It underscores that energy consumption remains a paramount issue in WSNs, with untapped potential for improving energy efficiency while ensuring robust security. Furthermore, it identifies existing approaches' weaknesses, rendering them inadequate for achieving energy-efficient routing in secure WSNs. This review sheds light on the critical challenges and opportunities in the field, contributing to a deeper understanding of WSNs and their role in secure IoT applications

    Particle Swarm Optimization for Interference Mitigation of Wireless Body Area Network: A Systematic Review

    Get PDF
    Wireless body area networks (WBAN) has now become an important technology in supporting services in the health sector and several other fields. Various surveys and research have been carried out massively on the use of swarm intelligent (SI) algorithms in various fields in the last ten years, but the use of SI in wireless body area networks (WBAN) in the last five years has not seen any significant progress. The aim of this research is to clarify and convince as well as to propose a answer to this problem, we have identified opportunities and topic trends using the particle swarm optimization (PSO) procedure as one of the swarm intelligence for optimizing wireless body area network interference mitigation performance. In this research, we analyzes primary studies collected using predefined exploration strings on online databases with the help of Publish or Perish and by the preferred reporting items for systematic reviews and meta-analysis (PRISMA) way. Articles were carefully selected for further analysis. It was found that very few researchers included optimization methods for swarm intelligence, especially PSO, in mitigating wireless body area network interference, whether for intra, inter, or cross-WBAN interference. This paper contributes to identifying the gap in using PSO for WBAN interference and also offers opportunities for using PSO both standalone and hybrid with other methods to further research on mitigating WBAN interference

    Not All Wireless Sensor Networks Are Created Equal: A Comparative Study On Tunnels

    Get PDF
    Wireless sensor networks (WSNs) are envisioned for a number of application scenarios. Nevertheless, the few in-the-field experiences typically focus on the features of a specific system, and rarely report about the characteristics of the target environment, especially w.r.t. the behavior and performance of low-power wireless communication. The TRITon project, funded by our local administration, aims to improve safety and reduce maintenance costs of road tunnels, using a WSN-based control infrastructure. The access to real tunnels within TRITon gives us the opportunity to experimentally assess the peculiarities of this environment, hitherto not investigated in the WSN field. We report about three deployments: i) an operational road tunnel, enabling us to assess the impact of vehicular traffic; ii) a non-operational tunnel, providing insights into analogous scenarios (e.g., underground mines) without vehicles; iii) a vineyard, serving as a baseline representative of the existing literature. Our setup, replicated in each deployment, uses mainstream WSN hardware, and popular MAC and routing protocols. We analyze and compare the deployments w.r.t. reliability, stability, and asymmetry of links, the accuracy of link quality estimators, and the impact of these aspects on MAC and routing layers. Our analysis shows that a number of criteria commonly used in the design of WSN protocols do not hold in tunnels. Therefore, our results are useful for designing networking solutions operating efficiently in similar environments

    QoS BASED ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORK

    Get PDF
    A Wireless Sensor Networks (WSN) is composed of a large number of low-powered sensor nodes that are randomly deployed to collect environmental data. In a WSN, because of energy scarceness, energy efficient gathering of sensed information is one of the most critical issues. Thus, most of the WSN routing protocols found in the literature have considered energy awareness as a key design issue. Factors like throughput, latency and delay are not considered as critical issues in these protocols. However, emerging WSN applications that involve multimedia and imagining sensors require end-to-end delay within acceptable limits. Hence, in addition to energy efficiency, the parameters (delay, packet loss ratio, throughput and coverage) have now become issues of primary concern. Such performance metrics are usually referred to as the Quality of Service (QoS) in communication systems. Therefore, to have efficient use of a sensor node’s energy, and the ability to transmit the imaging and multimedia data in a timely manner, requires both a QoS based and energy efficient routing protocol. In this research work, a QoS based energy efficient routing protocol for WSN is proposed. To achieve QoS based energy efficient routing, three protocols are proposed, namely the QoS based Energy Efficient Clustering (QoSEC) for a WSN, the QoS based Energy Efficient Sleep/Wake Scheduling (QoSES) for a WSN, and the QoS based Energy Efficient Mobile Sink (QoSEM) based Routing for a Clustered WSN. Firstly, in the QoSEC, to achieve energy efficiency and to prolong network/coverage lifetime, some nodes with additional energy resources, termed as super-nodes, in addition to normal capability nodes, are deployed. Multi-hierarchy clustering is done by having super-nodes (acting as a local sink) at the top tier, cluster head (normal node) at the middle tier, and cluster member (normal node) at the lowest tier in the hierarchy. Clustering within normal sensor nodes is done by optimizing the network/coverage lifetime through a cluster-head-selection algorithm and a sleep/wake scheduling algorithm. QoSEC resolves the hot spot problem and prolongs network/coverage lifetime. Secondly, the QoSES addressed the delay-minimization problem in sleep/wake scheduling for event-driven sensor networks for delay-sensitive applications. For this purpose, QoSES assigns different sleep/wake intervals (longer wake interval) to potential overloaded nodes, according to their varied traffic load requirement defined a) by node position in the network, b) by node topological importance, and c) by handling burst traffic in the proximity of the event occurrence node. Using these heuristics, QoSES minimizes the congestion at nodes having heavy traffic loads and ultimately reduces end-to-end delay while maximizing the throughput. Lastly, the QoSEM addresses hot spot problem, delay minimization, and QoS assurance. To address hot-spot problem, mobile sink is used, that move in the network to gather data by virtue of which nodes near to the mobile sink changes with each movement, consequently hot spot problem is minimized. To achieve delay minimization, static sink is used in addition to the mobile sink. Delay sensitive data is forwarded to the static sink, while the delay tolerant data is sent through the mobile sink. For QoS assurance, incoming traffic is divided into different traffic classes and each traffic class is assigned different priority based on their QoS requirement (bandwidth, delay) determine by its message type and content. Furthermore, to minimize delay in mobile sink data gathering, the mobile sink is moved throughout the network based on the priority messages at the nodes. Using these heuristics, QoSEM incur less end-to-end delay, is energy efficient, as well as being able to ensure QoS. Simulations are carried out to evaluate the performance of the proposed protocols of QoSEC, QoSES and QoSEM, by comparing their performance with the established contemporary protocols. Simulation results have demonstrated that when compared with contemporary protocols, each of the proposed protocol significantly prolong the network and coverage lifetime, as well as improve the other QoS routing parameters, such as delay, packet loss ratio, and throughput

    A framework for energy based performability models for wireless sensor networks

    Get PDF
    A novel idea of alternating node operations between Active and Sleep modes in Wireless Sensor Network (WSN) has successfully been used to save node power consumption. The idea which started off as a simple implementation of a timer in most protocols has been improved over the years to dynamically change with traffic conditions and the nature of application area. Recently, use of a second low power radio transceiver to triggered Active/Sleep modes has also been made. Active/Sleep operation modes have also been used to separately model and evaluate performance and availability of WSNs. The advancement in technology and continuous improvements of the existing protocols and application implementation demands continue to pose great challenges to the existing performance and availability models. In this study the need for integrating performance and availability studies of WSNs in the presence of both channel and node failures and repairs is investigated. A framework that outlines and characterizes key models required for integration of performance and availability of WSN is in turn outlined. Possible solution techniques for such models are also highlighted. Finally it is shown that the resulting models may be used to comparatively evaluate energy consumption of the existing motes and WSNs as well as deriving required performance measures
    • …
    corecore