324 research outputs found
Precise Packet Loss Pattern Generation by Intentional Interference
Abstract—Intermediate-quality links often cause vulnerable
connectivity in wireless sensor networks, but packet losses caused by such volatile links are not easy to trace. In order to equip link layer protocol designers with a reliable test and debugging tool, we develop a reactive interferer to generate packet loss patterns precisely. By using intentional interference to emulate parameterized lossy links with very low intrusiveness, our tool facilitates both robustness evaluation of protocols and flaw detection in protocol implementation
Zooming Into Radio Events by Bus Snooping
In this position paper, we advocate the use of bus snooping
to trace radio events. Highly precise and unintrusive, the technique leads to potentially more efficient code and enables more insightful protocol analysis than conventional code instrumentation techniques
Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks
In this paper we present a new kind of Denial-of-Service attack against the PHY layer of low power wireless sensor networks. Overcoming the very limited range of jamming-based attacks, this attack can penetrate deep into a target network with high power efficiency. We term this the Droplet attack, as it attains enormous disruption by dropping small, payload-less frame headers to its victim's radio receiver, depriving the latter of bandwidth and sleep time. We demonstrate the Droplet attack's high damage rate to full duty-cycle receivers, and further show that a high frequency version of Droplet can even force nodes running on very low duty-cycle MAC protocols to drop most of their packets
A Mote-in-the-Loop Approach for Exploring Communication Strategies for Sensor Networks
Sensor networks are being deployed in a range of different environments, such as industry plants, rainforests and offices. Each environment has its own characteristics and the appropriate communication strategy will differ accordingly – packet sizes, retransmission schemes, error correcting codes, etc. It is, however, difficult to investigate th
A Simple and Efficient Method to Mitigate the Hot Spot Problem in Wireless Sensor Networks
Much work on wireless sensor networks deals with or considers the hot
spot problem, i.e., the problem that the sensor nodes closest to the
base station are critical for the lifetime of the sensor network
because these nodes need to relay more packet than nodes further away
from the base station. Since it is often assumed that sensor nodes
will become inexpensive, a simple solution to the hot spot problem is
to place additional sensor nodes around the base stations. Using a
simple mathematical model we discuss the possible performance gains of
adding these supplementary nodes. Our results show that for certain
networks only a limited number of additional nodes are required to
fourfold network lifetime. We also show that the possible gain depends
heavily on the fraction of nodes already present in the vicinity of
the base station
On-demand Construction of Non-interfering Multiple Paths in Wireless Sensor Networks
In this paper we present a routing scheme for on-demand construction of multiple non-interfering paths in wireless sensor networks. One usage of this multipath scheme is to provide a source the ability to increase the likelihood that its data reaches the sink by sending a copy of a packet on more than one path. The routing scheme is based on the assumption that the sensor nodes are aware of their geographic position
- …