324 research outputs found

    Precise Packet Loss Pattern Generation by Intentional Interference

    Get PDF
    Abstract—Intermediate-quality links often cause vulnerable connectivity in wireless sensor networks, but packet losses caused by such volatile links are not easy to trace. In order to equip link layer protocol designers with a reliable test and debugging tool, we develop a reactive interferer to generate packet loss patterns precisely. By using intentional interference to emulate parameterized lossy links with very low intrusiveness, our tool facilitates both robustness evaluation of protocols and flaw detection in protocol implementation

    Zooming Into Radio Events by Bus Snooping

    Get PDF
    In this position paper, we advocate the use of bus snooping to trace radio events. Highly precise and unintrusive, the technique leads to potentially more efficient code and enables more insightful protocol analysis than conventional code instrumentation techniques

    Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks

    Get PDF
    In this paper we present a new kind of Denial-of-Service attack against the PHY layer of low power wireless sensor networks. Overcoming the very limited range of jamming-based attacks, this attack can penetrate deep into a target network with high power efficiency. We term this the Droplet attack, as it attains enormous disruption by dropping small, payload-less frame headers to its victim's radio receiver, depriving the latter of bandwidth and sleep time. We demonstrate the Droplet attack's high damage rate to full duty-cycle receivers, and further show that a high frequency version of Droplet can even force nodes running on very low duty-cycle MAC protocols to drop most of their packets

    A Mote-in-the-Loop Approach for Exploring Communication Strategies for Sensor Networks

    Get PDF
    Sensor networks are being deployed in a range of different environments, such as industry plants, rainforests and offices. Each environment has its own characteristics and the appropriate communication strategy will differ accordingly – packet sizes, retransmission schemes, error correcting codes, etc. It is, however, difficult to investigate th

    A Simple and Efficient Method to Mitigate the Hot Spot Problem in Wireless Sensor Networks

    Get PDF
    Much work on wireless sensor networks deals with or considers the hot spot problem, i.e., the problem that the sensor nodes closest to the base station are critical for the lifetime of the sensor network because these nodes need to relay more packet than nodes further away from the base station. Since it is often assumed that sensor nodes will become inexpensive, a simple solution to the hot spot problem is to place additional sensor nodes around the base stations. Using a simple mathematical model we discuss the possible performance gains of adding these supplementary nodes. Our results show that for certain networks only a limited number of additional nodes are required to fourfold network lifetime. We also show that the possible gain depends heavily on the fraction of nodes already present in the vicinity of the base station

    On-demand Construction of Non-interfering Multiple Paths in Wireless Sensor Networks

    Get PDF
    In this paper we present a routing scheme for on-demand construction of multiple non-interfering paths in wireless sensor networks. One usage of this multipath scheme is to provide a source the ability to increase the likelihood that its data reaches the sink by sending a copy of a packet on more than one path. The routing scheme is based on the assumption that the sensor nodes are aware of their geographic position
    corecore