965 research outputs found

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    Internet of Underwater Things and Big Marine Data Analytics -- A Comprehensive Survey

    Full text link
    The Internet of Underwater Things (IoUT) is an emerging communication ecosystem developed for connecting underwater objects in maritime and underwater environments. The IoUT technology is intricately linked with intelligent boats and ships, smart shores and oceans, automatic marine transportations, positioning and navigation, underwater exploration, disaster prediction and prevention, as well as with intelligent monitoring and security. The IoUT has an influence at various scales ranging from a small scientific observatory, to a midsized harbor, and to covering global oceanic trade. The network architecture of IoUT is intrinsically heterogeneous and should be sufficiently resilient to operate in harsh environments. This creates major challenges in terms of underwater communications, whilst relying on limited energy resources. Additionally, the volume, velocity, and variety of data produced by sensors, hydrophones, and cameras in IoUT is enormous, giving rise to the concept of Big Marine Data (BMD), which has its own processing challenges. Hence, conventional data processing techniques will falter, and bespoke Machine Learning (ML) solutions have to be employed for automatically learning the specific BMD behavior and features facilitating knowledge extraction and decision support. The motivation of this paper is to comprehensively survey the IoUT, BMD, and their synthesis. It also aims for exploring the nexus of BMD with ML. We set out from underwater data collection and then discuss the family of IoUT data communication techniques with an emphasis on the state-of-the-art research challenges. We then review the suite of ML solutions suitable for BMD handling and analytics. We treat the subject deductively from an educational perspective, critically appraising the material surveyed.Comment: 54 pages, 11 figures, 19 tables, IEEE Communications Surveys & Tutorials, peer-reviewed academic journa

    Analysis of MAC Strategies for Underwater Acoustic Networks

    Get PDF
    En esta tesis presentamos los protocolos MAC diseñados para redes acústicas subacuáticas, clasificándolos en amplias categorías, proporcionando técnicas de medición de rendimiento y análisis comparativo para seleccionar el mejor algoritmo MAC para aplicaciones específicas. Floor Acquisition Multiple Access (FAMA) es un protocolo MAC que se propuso para redes acústicas submarinas como medio para resolver los problemas de terminales ocultos y expuestos. Una versión modificada, Slotted FAMA, tenía como objetivo proporcionar ahorros de energía mediante el uso de ranuras de tiempo, eliminando así la necesidad de paquetes de control excesivamente largos en FAMA. Sin embargo, se ha observado que, debido al alto retraso de propagación en estas redes, el coste de perder un ACK es muy alto y tiene un impacto significativo en el rendimiento. Los mecanismos MultiACK y EarlyACK han sido analizados para el protocolo MACA, para mejorar su eficiencia. El mecanismo MultiACK aumenta la probabilidad de recibir al menos un paquete ACK al responder con un tren de paquetes ACK, mientras que el mecanismo EarlyACK evita la repetición de todo el ciclo de contención y transmisión de datos RTS / CTS enviando un ACK temprano. En esta investigación se presenta un análisis matemático de las dos variantes, los mecanismos MultiACK y EarlyACK, en Slotted FAMA. La investigación incluye las expresiones analíticas modificadas así como los resultados numéricos. Las simulaciones se llevaron a cabo utilizando ns-3. Los resultados han sido probados y validados utilizando Excel y MATLAB. La evaluación del rendimiento de S-FAMA con dos variantes mostró un factor de mejora del 65,05% en la probabilidad de recibir un ACK correctamente utilizando el mecanismo MultiACK y del 60,58% en la prevención de la repetición del ciclo completo, con EarlyACK. El impacto de este factor de mejora en el retardo, el tamaño del paquete de datos y el rendimiento también se analiza. La energía de transmisión desperdiciada y consumida en los mecanismos MultiACK y EarlyACK se analizan y comparan con S-FAMA. El rendimiento se ha evaluado, alcanzando una mejora en ambos casos, en comparación con S-FAMA. Estos mecanismos tendrán una utilidad práctica en caso de pérdida de ACK, al ahorrar energía y tiempo en períodos críticos. Fecha de lectura de Tesis Doctoral: 28 septiembre 2018.Esta tesis presenta una investigación sobre los protocolos MAC utilizados en la comunicación subacuática para explorar el mundo submarino. Los protocolos MAC ayudan en el acceso al medio compartido y la recopilación de datos de los océanos, para monitorizar el clima y la contaminación, la prevención de catástrofes, la navegación asistida, la vigilancia estratégica y la exploración de los recursos minerales. Esta investigación beneficiará a sectores como las industrias militares, de petróleo y gas, pesquerías, compañías de instrumentación subacuática, organismos de investigación, etc. El protocolo MAC afecta la vida útil de las redes inalámbricas de sensores. La eficiencia energética de las redes acústicas submarinas se ve gravemente afectada por las propiedades típicas de la propagación de las ondas acústicas. Los largos retrasos de propagación y las colisiones de paquetes de datos dificultan la transmisión de los paquetes de datos, que contienen información útil para que los usuarios realicen tareas de supervisión colectivas. El objetivo de este estudio es proponer nuevos mecanismos para protocolos MAC diseñados para funcionar en redes acústicas submarinas, con el propósito de mejorar su rendimiento. Para alcanzar ese objetivo es necesario realizar un análisis comparativo de los protocolos existentes. Lo que además sienta un procedimiento metodológicamente correcto para realizar esa comparación. Como la comunicación subacuática depende de ondas acústicas, en el diseño de los protocolos de MAC submarinos surgen varios desafíos como latencia prolongada, ancho de banda limitado, largas demoras en la propagación, grandes tasas de error de bit, pérdidas momentáneas en las conexiones, severo efecto multicamino y desvanecimientos. Los protocolos MAC terrestres, si se implementan directamente, funcionarán de manera ineficiente

    Underwater Acoustic Modems

    Full text link
    © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Due to the growing interest using underwater acoustic networks, there are more and more research papers about underwater communications. These papers are mainly focused on deployments and studies about the constraints of the underwater medium. The underwater acoustic channel is highly variable and the signal transmission can change according to environmental factors such as the temperature, pressure or salinity of the water. For this reason, it is important to know how these devices are developed and the maximum distance and data transfer rates they can achieve. To this end, this paper presents an exhaustive study of existing underwater acoustic modems where their main features are highlighted. We also review the main features of their hardware. All presented proposals in the research literature are compared with commercial underwater acoustic modems. Finally, we analyze different programs and improvements of existing network simulators that are often used to simulate and estimate the behavior of underwater networks.This work was supported by the Ministerio de Ciencia e Innovacion through the Plan Nacional de I+D+i 2008-2011 within the Subprograma de Proyectos de Investigacion Fundamental under Project TEC2011-27516. The associate editor coordinating the review of this paper and approving it for publication was Dr. Lei Shu. (Corresponding author: Jaime Lloret.)Sendra, S.; Lloret, J.; Jimenez, JM.; Parra-Boronat, L. (2015). Underwater Acoustic Modems. IEEE Sensors Journal. 16(11):4063-4071. https://doi.org/10.1109/JSEN.2015.2434890S40634071161

    Usage of Network Simulators in Machine-Learning-Assisted 5G/6G Networks

    Full text link
    Without any doubt, Machine Learning (ML) will be an important driver of future communications due to its foreseen performance when applied to complex problems. However, the application of ML to networking systems raises concerns among network operators and other stakeholders, especially regarding trustworthiness and reliability. In this paper, we devise the role of network simulators for bridging the gap between ML and communications systems. In particular, we present an architectural integration of simulators in ML-aware networks for training, testing, and validating ML models before being applied to the operative network. Moreover, we provide insights on the main challenges resulting from this integration, and then give hints discussing how they can be overcome. Finally, we illustrate the integration of network simulators into ML-assisted communications through a proof-of-concept testbed implementation of a residential Wi-Fi network

    Robotic Wireless Sensor Networks

    Full text link
    In this chapter, we present a literature survey of an emerging, cutting-edge, and multi-disciplinary field of research at the intersection of Robotics and Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system that aims to achieve certain sensing goals while meeting and maintaining certain communication performance requirements, through cooperative control, learning and adaptation. While both of the component areas, i.e., Robotics and WSN, are very well-known and well-explored, there exist a whole set of new opportunities and research directions at the intersection of these two fields which are relatively or even completely unexplored. One such example would be the use of a set of robotic routers to set up a temporary communication path between a sender and a receiver that uses the controlled mobility to the advantage of packet routing. We find that there exist only a limited number of articles to be directly categorized as RWSN related works whereas there exist a range of articles in the robotics and the WSN literature that are also relevant to this new field of research. To connect the dots, we first identify the core problems and research trends related to RWSN such as connectivity, localization, routing, and robust flow of information. Next, we classify the existing research on RWSN as well as the relevant state-of-the-arts from robotics and WSN community according to the problems and trends identified in the first step. Lastly, we analyze what is missing in the existing literature, and identify topics that require more research attention in the future

    AIDPS:Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks

    Full text link
    Underwater Acoustic Sensor Networks (UW-ASNs) are predominantly used for underwater environments and find applications in many areas. However, a lack of security considerations, the unstable and challenging nature of the underwater environment, and the resource-constrained nature of the sensor nodes used for UW-ASNs (which makes them incapable of adopting security primitives) make the UW-ASN prone to vulnerabilities. This paper proposes an Adaptive decentralised Intrusion Detection and Prevention System called AIDPS for UW-ASNs. The proposed AIDPS can improve the security of the UW-ASNs so that they can efficiently detect underwater-related attacks (e.g., blackhole, grayhole and flooding attacks). To determine the most effective configuration of the proposed construction, we conduct a number of experiments using several state-of-the-art machine learning algorithms (e.g., Adaptive Random Forest (ARF), light gradient-boosting machine, and K-nearest neighbours) and concept drift detection algorithms (e.g., ADWIN, kdqTree, and Page-Hinkley). Our experimental results show that incremental ARF using ADWIN provides optimal performance when implemented with One-class support vector machine (SVM) anomaly-based detectors. Furthermore, our extensive evaluation results also show that the proposed scheme outperforms state-of-the-art bench-marking methods while providing a wider range of desirable features such as scalability and complexity

    Machine Learning in Wireless Sensor Networks for Smart Cities:A Survey

    Get PDF
    Artificial intelligence (AI) and machine learning (ML) techniques have huge potential to efficiently manage the automated operation of the internet of things (IoT) nodes deployed in smart cities. In smart cities, the major IoT applications are smart traffic monitoring, smart waste management, smart buildings and patient healthcare monitoring. The small size IoT nodes based on low power Bluetooth (IEEE 802.15.1) standard and wireless sensor networks (WSN) (IEEE 802.15.4) standard are generally used for transmission of data to a remote location using gateways. The WSN based IoT (WSN-IoT) design problems include network coverage and connectivity issues, energy consumption, bandwidth requirement, network lifetime maximization, communication protocols and state of the art infrastructure. In this paper, the authors propose machine learning methods as an optimization tool for regular WSN-IoT nodes deployed in smart city applications. As per the author’s knowledge, this is the first in-depth literature survey of all ML techniques in the field of low power consumption WSN-IoT for smart cities. The results of this unique survey article show that the supervised learning algorithms have been most widely used (61%) as compared to reinforcement learning (27%) and unsupervised learning (12%) for smart city applications
    corecore