2 research outputs found

    Cooja Simulator Manual

    Get PDF
    While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation. The Contiki website provides an image of Instant Contiki which can then be used with the virtualisation tool VMware. Once Instant Contiki is successfully started the Contiki website can then be referred to for brief instructions regarding a simple network setup on Cooja. However, this is the sum total of any official documentation regarding Cooja, with the majority of support being provided within Internet discussion groups. This report, therefore, aims to provide an instruction set, to enable anyone with no previous exposure to Cooja to be able to create network layouts, compile motes, examine output using the Sensor Data Collect plugin and also utilise scripts to produce more fine-grained results

    A novel situation specific network security for Wireless Sensor Networks

    No full text
    Researchers have come up with many high level security protocols and key management algorithms that can be applied for different types of networks. The main characteristics of wireless sensor networks that are limited computation and power made it difficult to apply these secure key management algorithms since it consumes much power and resources. Sensors in the field at different periods of time of their life time need higher level of security more than other times - sensors in a battlefield need higher security when it is war time.In our research we developed an adaptive security protocol for two-layer clustered heterogeneous wireless sensor networks that can toggle between five different modes of operation, each with different security level. Each level of security has its own encryption/decryption algorithm and specified key length depending on the situation of the application and the situation for the wireless sensor networks
    corecore