11 research outputs found

    Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks

    Get PDF
    Data dissemination is the most significant task in a Wireless Sensor Network (WSN). From the bootstrapping stage to the full functioning stage, a WSN must disseminate data in various patterns like from the sink to node, from node to sink, from node to node, or the like. This is what a WSN is deployed for. Hence, this issue comes with various data routing models and often there are different types of network settings that influence the way of data collection and/or distribution. Considering the importance of this issue, in this paper, we present a survey on various prominent data dissemination techniques in such network. Our classification of the existing works is based on two main parameters: the number of sink (single or multiple) and the nature of its movement (static or mobile). Under these categories, we have analyzed various previous works for their relative strengths and weaknesses. A comparison is also made based on the operational methods of various data dissemination schemes

    On the Medium Access Control Protocols Suitable for Wireless Sensor Networks – A Survey

    Get PDF
    A MAC (Medium Access Control) protocol has direct impact on the energy efficiency and traffic characteristics of any Wireless Sensor Network (WSN). Due to the inherent differences in WSN’s requirements and application scenarios, different kinds of MAC protocols have so far been designed especially targeted to WSNs, though the primary mode of communications is wireless like any other wireless network. This is the subject topic of this survey work to analyze various aspects of the MAC protocols proposed for WSNs. To avoid collision and ensure reliability, before any data transmission between neighboring nodes in MAC layer, sensor nodes may need sampling channel and synchronizing. Based on these needs, we categorize the major MAC protocols into three classes, analyze each protocol’s relative advantages and disadvantages, and finally present a comparative summary which could give a snapshot of the state-of-the-art to guide other researchers find appropriate areas to work on. In spite of various existing survey works, we have tried to cover all necessary aspects with the latest advancements considering the major works in this area

    Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security

    Get PDF
    The industrial control systems are facing an increasing number of sophisticated cyber attacks that can have very dangerous consequences on humans and their environments. In order to deal with these issues, novel technologies and approaches should be adopted. In this paper, we focus on the security of commands in industrial IoT against forged commands and misrouting of commands. To this end, we propose a security architecture that integrates the Blockchain and the Software-defined network (SDN) technologies. The proposed security architecture is composed of: (a) an intrusion detection system, namely RSL-KNN, which combines the Random Subspace Learning (RSL) and K-Nearest Neighbor (KNN) to defend against the forged commands, which target the industrial control process, and (b) a Blockchain-based Integrity Checking System (BICS), which can prevent the misrouting attack, which tampers with the OpenFlow rules of the SDN-enabled industrial IoT systems. We test the proposed security solution on an Industrial Control System Cyber attack Dataset and on an experimental platform combining software-defined networking and blockchain technologies. The evaluation results demonstrate the effectiveness and efficiency of the proposed security solution

    BMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks

    No full text
    Multicontroller software-defined networks have been widely adopted to enable management of large-scale networks. However, they are vulnerable to several attacks including false data injection, which creates topology inconsistency among controllers. To deal with this issue, we propose BMC-SDN, a security architecture that integrates blockchain and multicontroller SDN and divides the network into several domains. Each SDN domain is managed by one master controller that communicates through blockchain with the masters of the other domains. The master controller creates blocks of network flow updates, and its redundant controllers validate the new block based on a proposed reputation mechanism. The reputation mechanism rates the controllers, i.e., block creator and voters, after each voting operation using constant and combined adaptive fading reputation strategies. The evaluation results demonstrate a fast and optimal detection of fraudulent flow rule injection

    Strengths and weaknesses of prominent data dissemination techniques in wireless sensor networks

    No full text
    Data dissemination is the most significant task in a Wireless Sensor Network (WSN). From the bootstrapping stage to the full functioning stage, a WSN must disseminate data in various patterns like from the sink to node, from node to sink, from node to node, or the like. This is what a WSN is deployed for. Hence, this issue comes with various data routing models and often there are different types of network settings that influence the way of data collection and/or distribution. Considering the importance of this issue, in this paper, we present a survey on various prominent data dissemination techniques in such network. Our classification of the existing works is based on two main parameters: the number of sink (single or multiple) and the nature of its movement (static or mobile). Under these categories, we have analyzed various previous works for their relative strengths and weaknesses. A comparison is also made based on the operational methods of various data dissemination schemes

    Local Density Estimation for VANETs

    No full text
    International audienceLocal vehicle density estimation is an integral part of various applications of Vehicular Ad-hoc Networks (VANETs) such as congestion control and congestion traffic estimation. Currently, many applications use beacons to estimate this density. However, many studies show that the reception rate of these beacons can significantly drop at short distances due to a broadcast storm problem in high-density situations. Therefore, the local vehicle density estimation helps VANETs' applications in giving an estimate of the number of neighbors in their communication range where a vehicle could send and receive correctly packets. Indeed, an accuracy local density estimation considerably enhances the performance of these applications and makes them adaptable to different road scenarios. Our aim in this work is to extend more the local density to be segmented and within the maximum transmission range. This potential gives VANETs' application the ability to estimate at different ranges depending on their requirements. To this goal, this paper proposes a segment-based approach that ensures high accuracy with low overhead over the maximum vehicles transmission range. Performance results show that the proposed strategy reaches a mean error ratio of approximately 3% with limited overhead over 1000m of range

    On the medium access control protocols suitable for wireless sensor networks – a survey

    No full text
    MAC (Medium Access Control) protocol has direct impact on the energy efficiency and traffic characteristics of any Wireless Sensor Network (WSN). Due to the inherent differences in WSN’s requirements and application scenarios, different kinds of MAC protocols have so far been designed especially targeted to WSNs, though the primary mode of communications is wireless like any other wireless network. This is the subject topic of this survey work to analyze various aspects of the MAC protocols proposed for WSNs. To avoid collision and ensure reliability, before any data transmission between neighboring nodes in MAC layer, sensor nodes may need sampling channel and synchronizing. Based on these needs, we categorize the major MAC protocols into three classes, analyze each protocol’s relative advantages and disadvantages, and finally present a comparative summary which could give a snapshot of the state-of-the-art to guide other researchers find appropriate areas to work on. In spite of various existing survey works, we have tried to cover all necessary aspects with the latest advancements considering the major works in this area

    Enhanced local density estimation in internet of vehicles

    No full text
    International audienceThe Internet of vehicles allows connecting vehicles to the Internet to make all data from vehicles available for applications aimed towards improving safety and comfort for passengers. Density is one of the most important sensed data to gather. This information is mainly obtained through periodic messages broadcast by the neighbouring vehicles. However, the availability of this information depends on the Internet. A low penetration rate of Internet of vehicles, or the loss of Internet connection, can significantly affect the accuracy of the sensed density. Moreover, the reception rate of the periodic messages seriously drops at short distances caused by the broadcast storm problem in high-density scenarios. To address this problem, using inter-vehicular communications, we propose a segment-based approach for enhancing the accuracy of the local density estimation. This approach provides a highly accurate estimation with low overhead over the maximum vehicles transmission range to all the vehicles. The proposed approach is extensively evaluated analytically and by simulation. Performance evaluation results show that our approach SLDE allows about 3% of mean error ratio with low overhead over the maximum transmission range
    corecore