4 research outputs found

    A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication

    Get PDF
    International audienceIn this paper, we present a monitoring based approach for securing upper layer communications of WSN (Wireless Sensor Networks), the latter using IEEE802.15.4/6LoWPAN stacks and tinyDTLS. The monitoring techniques have been integrated as an extension to the industrial tool MMT (Montimage Monitoring Tool). The MMT-extension verifies that the network is working following a set of security rules that have been defined by ETSI. The security rules check if the protocol stack is working properly. If MMT detects a security rule that was not respected, then it sends an alarm to the system manager so that he can take properly reactive adjustments. We tested each of the security rules in MMT's extension using point-to-point configuration. After all these tests were verified, we tested our MMT-extension using real data gathered from the FIT IoT-LAB platform. The results of these tests shown that our MMT's extension for WSN using IEEE-802.15.4/6LowPAN and DTLS communication is feasible

    Monitorage des réseaux des capteurs sans fils (WSN) : application à l'interopérabilité sécurisée

    No full text
    The denominated "Internet of Things'' (IoT) has been getting relevance in both the public and research communities. The main reason is that on 2011, the number of “objects” connected to the Internet surpassed the number of humans online, and is expected that for 2020, the number of objects exceeds the amount of 20 billion. Because of the high number of heterogeneous platforms that composed the IoT, our interest is centered around the Wireless Sensors Networks (WSN), which are composed by small devices with constrained resources (small amount of memory, small power processor, and small power supply) that collect one or more type of data. Almost all the research conducted to date relies on standardizing the communication protocols, ameliorating the performance, optimizing the resource consumption, etc. Security has been relegated to a second plane, due mainly to the low resources available on the sensors. However, the data collected in many scenarios can be highly sensitive. The data must be stored in a safe way and must be transmitted in a safe approach from the origin to the destiny. The work developed in this dissertation defines mechanisms to guarantee the safety of the communication between sensors. And, providing native tools for the monitoring of the communication, to validate these mechanisms directly on the networkLa formule "Internet of Things'' a pris du sens Ă  la fois au sein de la communautĂ© public et de recherche. La raison principale est qu'en 2011, le nombre d'objets connectĂ©s Ă  Internet surpassent le nombre d'humains en ligne, et il est attendu qu'en 2020, le nombre d'objets connectĂ©s dĂ©passent les 20 billions. Etant donnĂ© la prĂ©sence d'un grand nombre de plateformes hĂ©tĂ©rogĂšnes qui composent l'IoT, notre intĂ©rĂȘt se focalise sur les RĂ©seaux de Capteurs (WSN), qui sont composĂ©s des petits dispositifs avec des contraintes de ressources (capacitĂ© de mĂ©moire faible, processeur de faible puissance et faible puissance matĂ©rielle) qui collectent un ou plusieurs types de donnĂ©es. Presque toutes les recherches menĂ©es Ă  ce jour reposent sur la standardisation de protocoles de communication, l'amĂ©lioration de la performance, l'optimisation de la consommation de ressources, etc. La sĂ©curitĂ© a Ă©tĂ© relĂ©guĂ©e au second plan, dĂ» principalement au faibles ressources disponibles sur les capteurs. Cependant, les donnĂ©es collectĂ©es dans de multiples scĂ©narios peuvent ĂȘtre trĂšs sensibles. Les donnĂ©es doivent ĂȘtre stockĂ©es de maniĂšre sĂ»r et doivent ĂȘtre transmises de maniĂšre sĂ»r d'un point Ă  un autre. Le travail dĂ©veloppĂ© dans cette thĂšse dĂ©finit les mĂ©canismes permettant de garantir une communication sĂ»r entre les capteurs. Et aussi fournissant des outils natifs pour le monitorage des communications, afin de valider ces mĂ©canismes directement sur le rĂ©seau

    Wireless Sensors Networks (WSN) monitoring : application to secure interoperability

    No full text
    La formule "Internet of Things'' a pris du sens Ă  la fois au sein de la communautĂ© public et de recherche. La raison principale est qu'en 2011, le nombre d'objets connectĂ©s Ă  Internet surpassent le nombre d'humains en ligne, et il est attendu qu'en 2020, le nombre d'objets connectĂ©s dĂ©passent les 20 billions. Etant donnĂ© la prĂ©sence d'un grand nombre de plateformes hĂ©tĂ©rogĂšnes qui composent l'IoT, notre intĂ©rĂȘt se focalise sur les RĂ©seaux de Capteurs (WSN), qui sont composĂ©s des petits dispositifs avec des contraintes de ressources (capacitĂ© de mĂ©moire faible, processeur de faible puissance et faible puissance matĂ©rielle) qui collectent un ou plusieurs types de donnĂ©es. Presque toutes les recherches menĂ©es Ă  ce jour reposent sur la standardisation de protocoles de communication, l'amĂ©lioration de la performance, l'optimisation de la consommation de ressources, etc. La sĂ©curitĂ© a Ă©tĂ© relĂ©guĂ©e au second plan, dĂ» principalement au faibles ressources disponibles sur les capteurs. Cependant, les donnĂ©es collectĂ©es dans de multiples scĂ©narios peuvent ĂȘtre trĂšs sensibles. Les donnĂ©es doivent ĂȘtre stockĂ©es de maniĂšre sĂ»r et doivent ĂȘtre transmises de maniĂšre sĂ»r d'un point Ă  un autre. Le travail dĂ©veloppĂ© dans cette thĂšse dĂ©finit les mĂ©canismes permettant de garantir une communication sĂ»r entre les capteurs. Et aussi fournissant des outils natifs pour le monitorage des communications, afin de valider ces mĂ©canismes directement sur le rĂ©seauxThe denominated "Internet of Things'' (IoT) has been getting relevance in both the public and research communities. The main reason is that on 2011, the number of “objects” connected to the Internet surpassed the number of humans online, and is expected that for 2020, the number of objects exceeds the amount of 20 billion. Because of the high number of heterogeneous platforms that composed the IoT, our interest is centered around the Wireless Sensors Networks (WSN), which are composed by small devices with constrained resources (small amount of memory, small power processor, and small power supply) that collect one or more type of data. Almost all the research conducted to date relies on standardizing the communication protocols, ameliorating the performance, optimizing the resource consumption, etc. Security has been relegated to a second plane, due mainly to the low resources available on the sensors. However, the data collected in many scenarios can be highly sensitive. The data must be stored in a safe way and must be transmitted in a safe approach from the origin to the destiny. The work developed in this dissertation defines mechanisms to guarantee the safety of the communication between sensors. And, providing native tools for the monitoring of the communication, to validate these mechanisms directly on the networ

    Path sampling, a robust alternative to gossiping for opportunistic network routing

    No full text
    International audienceOpportunistic Networks have been designed for transmitting data in difficult environments, characterized by high mobility, sporadic connectivity, and constrained resources. To sustain these networks, the literature describes methods such as Epidemic and Spra & Wait, which do not learn from the network behaviour, and Gossiping-based algorithms that collect historical network data to improve efficiency. In this paper, we show that Gossiping-based solutions suffer from pathological behaviour in some simple network scenarios. Under certain conditions almost all the data transmitted by some nodes may get lost in the network, not reaching its destination. To address this problem we have proposed an algorithm that responds in a more robust manner while staying relatively simple. In this work, we show that our algorithm achieves delivery rates comparable to gossiping-based algorithms, while being more robust and providing better fairness. To illustrate this result, we test native implementations of our solution, Path Sampling, and related algorithms on a network simulato
    corecore