145 research outputs found

    Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures

    Get PDF
    Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, the security of IoT should start with foremost securing WSNs ahead of the other components. However, owing to the absence of a physical line-of-defense, i.e., there is no dedicated infrastructure such as gateways to watch and observe the flowing information in the network, security of WSNs along with IoT is of a big concern to the scientific community. More specifically, for the application areas in which CIA (confidentiality, integrity, availability) has prime importance, WSNs and emerging IoT technology might constitute an open avenue for the attackers. Besides, recent integration and collaboration of WSNs with IoT will open new challenges and problems in terms of security. Hence, this would be a nightmare for the individuals using these systems as well as the security administrators who are managing those networks. Therefore, a detailed review of security attacks towards WSNs and IoT, along with the techniques for prevention, detection, and mitigation of those attacks are provided in this paper. In this text, attacks are categorized and treated into mainly two parts, most or all types of attacks towards WSNs and IoT are investigated under that umbrella: “Passive Attacks” and “Active Attacks”. Understanding these attacks and their associated defense mechanisms will help paving a secure path towards the proliferation and public acceptance of IoT technology

    Performance Analysis of UAV Enabled Disaster Recovery Networks: A Stochastic Geometric Framework Based on Cluster Processes

    Get PDF
    In this paper, we develop a comprehensive statistical framework to characterize and model large-scale unmanned aerial vehicle-enabled post-disaster recovery cellular networks. In the case of natural or man-made disasters, the cellular network is vulnerable to destruction resulting in coverage voids or coverage holes. Drone-based small cellular networks (DSCNs) can be rapidly deployed to fill such coverage voids. Due to capacity and back-hauling limitations on drone small cells (DSCs), each coverage hole requires a multitude of DSCs to meet the shortfall coverage at a desired quality-of-service. Moreover, ground users also tend to cluster in hot-spots in a post-disaster scenario. Motivated by this fact, we consider the clustered deployment of DSCs around the site of a destroyed BS. Joint consideration partially operating BSs and deployed DSCs yields a unique topology for such public safety networks. Borrowing tools from stochastic geometry, we develop a statistical framework to quantify the down-link performance of a DSCN. Our proposed clustering mechanism extends the traditional Matern and Thomas cluster processes to a more general case, where cluster size is dependent upon the size of the coverage hole. We then employ the newly developed framework to find closed-form expressions (later verified by Monte-Carlo simulations) to quantify the coverage probability, area spectral efficiency, and the energy efficiency for the down-link mobile user. Finally, we explore several design parameters (for both of the adopted cluster processes) that address optimal deployment of the network (i.e., number of drones per cluster, drone altitudes, and transmit power ratio between the traditional surviving base stations and the drone base stations)

    Survey and taxonomy of clustering algorithms in 5G

    Get PDF
    The large-scale deployment of fifth generation (5G) is expected to produce a massive amount of data with high variability due to ultra-densification and the rapid increase in a heterogeneous range of applications and services (e.g., virtual reality, augmented reality, and driver-less vehicles), and network devices (e.g., smart gadgets and sensors). Clustering organizes network topology by segregating nodes with similar interests or behaviors in a network into logical groups in order to achieve network-level and cluster-level enhancements, particularly cluster stability, load balancing, social awareness, fairness, and quality of service. Clustering has been investigated to support mobile user equipment (UE) in access networks, whereby UEs form clusters themselves and may connect to BSs. In this paper, we present a comprehensive survey of the research work of clustering schemes proposed for various scenarios in 5G networks and highlight various aspects of clustering schemes, including objectives, challenges, metrics, characteristics, performance measures. Furthermore, we present open issues of clustering in 5G

    A QoS-Based Wireless Multimedia Sensor Cluster Protocol

    Full text link
    Wireless Sensor Networks (WSNs) provide a wireless network infrastructure for sensed data transport in environments where wired or satellite technologies cannot be used. Because the embedded hardware of the sensor nodes has been improved very much in the last years and the number of real deployments is increasing considerably, they have become a reliable option for the transmission of any type of sensed data, from few sensed measures to multimedia data. This paper proposes a new protocol that uses an ad hoc cluster based architecture which is able to adapt the logical sensor network topology to the delivered multimedia stream features, guaranteeing the quality of the communications. The proposed protocol uses the quality of service (QoS) parameters, such as bandwidth, delay, jitter, and packet loss, of each type of multimedia stream as a basis for the sensor clusters creation and organization inside the WSN, providing end-to-end QoS for each multimedia stream. We present real experiments that show the performance of the protocol for several video and audio cases when it is runningThis work has been partially supported by the "Ministerio de Ciencia e Innovacion," through the "Plan Nacional de I+D+i 2008-2011" in the "Subprograma de Proyectos de Investigacion Fundamental," Project TEC2011-27516. This work has also been partially supported by the Instituto de Telecomunicacoes, Next Generation Networks and Applications Group (NetGNA), Portugal, by the Government of Russian Federation, Grant 074-U01, and by National Funding from the Fundacao para a Ciencia e a Tecnologia (FCT) through the PEst-OE/EEI/LA0008/2013 Project.Díaz Santos, JR.; Lloret, J.; Jimenez, JM.; Rodrigues, JJPC. (2014). A QoS-Based Wireless Multimedia Sensor Cluster Protocol. International Journal of Distributed Sensor Networks. 2014:1-17. https://doi.org/10.1155/2014/480372S1172014Bri, D., Garcia, M., Lloret, J., & Dini, P. (2009). Real Deployments of Wireless Sensor Networks. 2009 Third International Conference on Sensor Technologies and Applications. doi:10.1109/sensorcomm.2009.69Karim, L., Anpalagan, A., Nasser, N., & Almhana, J. (2013). Sensor-based M2M Agriculture Monitoring Systems for Developing Countries: State and Challenges. Network Protocols and Algorithms, 5(3), 68. doi:10.5296/npa.v5i3.3787Edo, M., Canovas, A., Garcia, M., & Lloret, J. (s. f.). Providing VoIP and IPTV Services in WLANs. Handbook of Research on Mobility and Computing, 426-444. doi:10.4018/978-1-60960-042-6.ch028Diab, R., Chalhoub, G., & Misson, M. (2013). Overview on Multi-Channel Communications in Wireless Sensor Networks. Network Protocols and Algorithms, 5(3), 112. doi:10.5296/npa.v5i3.3811Khoukhi, L., & Cherkaoui, S. (2010). Intelligent QoS management for multimedia services support in wireless mobile ad hoc networks. Computer Networks, 54(10), 1692-1706. doi:10.1016/j.comnet.2010.01.014Abbas, C. J. B., Orozco, A. L. S., & Villalba, L. J. G. (2012). A distributed QoS mechanism for ad hoc network. International Journal of Ad Hoc and Ubiquitous Computing, 11(1), 25. doi:10.1504/ijahuc.2012.049282Çevik, T., & Zaim, A. H. (2013). A Multichannel Cross-Layer Architecture for Multimedia Sensor Networks. International Journal of Distributed Sensor Networks, 9(3), 457045. doi:10.1155/2013/457045Li, Z., Bi, J., & Chen, S. (2013). Traffic Prediction-Based Fast Rerouting Algorithm for Wireless Multimedia Sensor Networks. International Journal of Distributed Sensor Networks, 9(5), 176293. doi:10.1155/2013/176293Lloret, J., Palau, C., Boronat, F., & Tomas, J. (2008). Improving networks using group-based topologies. Computer Communications, 31(14), 3438-3450. doi:10.1016/j.comcom.2008.05.030Lloret, J., Garcia, M., Tomás, J., & Boronat, F. (2008). GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks. Journal of Computer Science and Technology, 23(3), 461-480. doi:10.1007/s11390-008-9147-6Lehsaini, M., Guyennet, H., & Feham, M. (2010). An efficient cluster-based self-organisation algorithm for wireless sensor networks. International Journal of Sensor Networks, 7(1/2), 85. doi:10.1504/ijsnet.2010.031852Lloret, J., Garcia, M., Bri, D., & Diaz, J. (2009). A Cluster-Based Architecture to Structure the Topology of Parallel Wireless Sensor Networks. Sensors, 9(12), 10513-10544. doi:10.3390/s91210513Diaz, J. R., Lloret, J., Jimenez, J. M., & Sendra, S. (2014). MWAHCA: A Multimedia Wireless Ad Hoc Cluster Architecture. The Scientific World Journal, 2014, 1-14. doi:10.1155/2014/913046Wei, D., & Chan, H. (2006). Clustering Ad Hoc Networks: Schemes and Classifications. 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks. doi:10.1109/sahcn.2006.288583Yu, J. Y., & Chong, P. H. J. (2005). A survey of clustering schemes for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 7(1), 32-48. doi:10.1109/comst.2005.1423333Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30(14-15), 2826-2841. doi:10.1016/j.comcom.2007.05.024Boyinbode, O., Le, H., & Takizawa, M. (2011). A survey on clustering algorithms for wireless sensor networks. International Journal of Space-Based and Situated Computing, 1(2/3), 130. doi:10.1504/ijssc.2011.040339Ramachandran, L., Kapoor, M., Sarkar, A., & Aggarwal, A. (2000). Clustering algorithms for wireless ad hoc networks. Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications - DIALM ’00. doi:10.1145/345848.345860Chatterjee, M., Das, S. K., & Turgut, D. (2002). Cluster Computing, 5(2), 193-204. doi:10.1023/a:1013941929408Huang, Y.-M., Hsieh, M.-Y., & Wang, M.-S. (2007). Reliable transmission of multimedia streaming using a connection prediction scheme in cluster-based ad hoc networks. Computer Communications, 30(2), 440-452. doi:10.1016/j.comcom.2006.09.012Tang, S., & Li, W. (2006). QoS supporting and optimal energy allocation for a cluster based wireless sensor network. Computer Communications, 29(13-14), 2569-2577. doi:10.1016/j.comcom.2006.02.007Rosário, D., Costa, R., Paraense, H., Machado, K., Cerqueira, E., Braun, T., & Zhao, Z. (2012). A Hierarchical Multi-hop Multimedia Routing Protocol for Wireless Multimedia Sensor Networks. Network Protocols and Algorithms, 4(4). doi:10.5296/npa.v4i4.2121Diaz, J. R., Lloret, J., Jiménez, J. M., & Hammoumi, M. (2014). A new multimedia-oriented architecture and protocol for wireless ad hoc networks. International Journal of Ad Hoc and Ubiquitous Computing, 16(1), 14. doi:10.1504/ijahuc.2014.062486Meghanathan, N., & Mumford, P. (2013). Centralized and Distributed Algorithms for Stability-based Data Gathering in Mobile Sensor Networks. Network Protocols and Algorithms, 84. doi:10.5296/npa.v5i4.420

    Security in Mobile Networks: Communication and Localization

    Get PDF
    Nowadays the mobile networks are everywhere. The world is becoming more dependent on wireless and mobile services, but the rapid growth of these technologies usually underestimates security aspects. As wireless and mobile services grow, weaknesses in network infrastructures become clearer. One of the problems is privacy. Wireless technologies can reduce costs, increase efficiencies, and make important information more readily and widely available. But, there are also risks. Without appropriate safeguards, these data can be read and modified by unauthorized users. There are many solutions, less and more effective, to protect the data from unauthorized users. But, a specific application could distinguish more data flows between authorized users. Protect the privacy of these information between subsets of users is not a trivial problem. Another problem is the reliability of the wireless service. Multi-vehicle systems composed of Autonomous Guided Vehicles (AGVs) are largely used for industrial transportation in manufacturing and logistics systems. These vehicles use a mobile wireless network to exchange information in order to coordinate their tasks and movements. The reliable dissemination of these information is a crucial operation, because the AGVs may achieve an inconsistent view of the system leading to the failure of the coordination task. This has clear safety implications. Going more in deep, even if the communication are confidential and reliable, anyway the positioning information could be corrupted. Usually, vehicles get the positioning information through a secondary wireless network system such as GPS. Nevertheless, the widespread civil GPS is extremely fragile in adversarial scenarios. An insecure distance or position estimation could produce security problems such as unauthorized accesses, denial of service, thefts, integrity disruption with possible safety implications and intentional disasters. In this dissertation, we face these three problems, proposing an original solution for each one

    Adaptive Network Densification with Small Cell Mobile Base Stations Carried by Vehicles

    Get PDF
    1noL'abstract è presente nell'allegato / the abstract is in the attachmentopen676. INGEGNERIA ELETTRICAnopartially_openembargoed_20211014Mohammadnia, Foroog

    Object tracking sensor networks in smart cities: Taxonomy, architecture, applications, research challenges and future directions

    Get PDF
    The development of pervasive communication devices and the emergence of the Internet of Things (IoT) have acted as an essential part in the feasibility of smart city initiatives. Wireless sensor network (WSN) as a key enabling technology in IoT offers the potential for cities to get smatter. WSNs gained tremendous attention during the recent years because of their rising number of applications that enables remote monitoring and tracking in smart cities. One of the most exciting applications of WSNs in smart cities is detection, monitoring, and tracking which is referred to as object tracking sensor networks (OTSN). The adaptation of OTSN into urban cities brought new exciting challenges for reaching the goal of future smart cities. Such challenges focus primarily on problems related to active monitoring and tracking in smart cities. In this paper, we present the essential characteristics of OTSN, monitoring and tracking application used with the content of smart city. Moreover, we discussed the taxonomy of OTSN along with analysis and comparison. Furthermore, research challenges are investigated concerning energy reservation, object detection, object speed, accuracy in tracking, sensor node collaboration, data aggregation and object recovery position estimation. This review can serve as a benchmark for researchers for future development of smart cities in the context of OTSN. Lastly, we provide future research direction

    ActMesh- A Cognitive Resource Management paradigm for dynamic mobile Internet Access with Reliability Guarantees

    Get PDF
    Wireless Mesh Networks (WMNs) are going increasing attention as a flexible low-cost networking architecture to provide media Internet access over metropolitan areas to mobile clients requiring multimedia services. In WMNs, Mesh Routers (MRs) from the mesh backbone and accomplish the twofold task of traffic forwarding, as well as providing multimedia access to mobile Mesh Clients (MCs). Due to the intensive bandwidth-resource requested for supporting QoS-demanding multimedia services, performance of the current WMNs is mainly limited by spectrum-crowding and traffic-congestion, as only scarce spectrum-resources is currently licensed for the MCs' access. In principle, this problem could be mitigated by exploiting in a media-friendly (e.g., content-aware) way the context-aware capabilities offered by the Cognitive Radio (CR) paradigm. As integrated exploitation of both content and context-aware system's capabilities is at the basis of our proposed Active Mesh (ActMesh) networking paradigm. This last aims at defining a network-wide architecture for realizing media-friendly Cognitive Mesh nets (e.g., context aware Cognitive Mesh nets). Hence, main contribution of this work is four fold: 1. After introducing main functional blocks of our ActMesh architecture, suitable self-adaptive Belief Propagation and Soft Data Fusion algorithms are designed to provide context-awareness. This is done under both cooperative and noncooperative sensing frameworks. 2. The resulting network-wide resource management problem is modelled as a constrained stochastic Network Utility Maximization (NUM) problem, with the dual (contrasting) objective to maximize spectrum efficiency at the network level, while accounting for the perceived quality of the delivered media flows at the client level. 3. A fully distributed, scalable and self-adaptive implementation of the resulting Active Resource Manager (ARM) is deployed, that explicitly accounts for the energy limits of the battery powered MCs and the effects induced by both fading and client mobility. Due to informationally decentralized architecture of the ActMesh net, the complexity of (possibly, optimal) centralized solutions for resource management becomes prohibitive when number of MCs accessing ActMesh net grow. Furthermore, centralized resource management solutions could required large amounts of time to collect and process the required network information, which, in turn, induce delay that can be unacceptable for delay sensitive media applications, e.g., multimedia streaming. Hence, it is important to develop network-wide ARM policies that are both distributed and scalable by exploiting the radio MCs capabilities to sense, adapt and coordinate themselves. We validate our analytical models via simulation based numerical tests, that support actual effectiveness of the overall ActMesh paradigm, both in terms of objective and subjective performance metrics. In particular, the basic tradeoff among backbone traffic-vs-access traffic arising in the ActMesh net from the bandwidth-efficient opportunistic resource allocation policy pursued by the deployed ARM is numerically characterized. The standardization framework we inspire to is the emerging IEEE 802.16h one
    corecore