25 research outputs found

    Energy-Efficient {WSN} Infrastructure

    No full text
    International audienceEnergy conserving communication is one of the main challenges of wireless sensor networks. A number of studies and research are focused on saving energy and on extending the lifetime of these networks. Architectural approaches, like hierarchical structures, tend to organize network nodes in order to save energy. Most of these protocols need background information on the network in order to be efficient. In this paper, we describe a new approach for organizing large sensor networks into zones, based on the number of hops. This network architecture enables a hierarchical network view, with the purpose of offering efficient routing protocols based on zone partitioning. Simulations undertaken demonstrate that our approach is energy-efficient; this is highlighted by the reduction of traffic overhead

    Wireless Sensor Networks Routing over Zones

    No full text
    International audienceIn this paper, we propose a routing protocol for wireless sensor networks based on a two-level, zone-based architecture. DV is applied in both intra-zone and inter-zone routing, based on the hop metric. Our solution is original because it is instrumentation-free (sensors are both localization and energy unaware) and completely distributed. We show performances of the proposed algorithm evaluating the overhead generated by the construction of the infrastructure needed in routing. Simulations for MICA2 sensors have given us indications on the energy consumption - almost 4*10−4^{-4}% of the total battery capacity, on the scalability property of the algorithm and on the memory size of the data structure used for routing - almost 13% of the RAM memory. Moreover, memory constraints allow us to determine a lower bound for the number of zones

    WSN Hierarchical Routing Protocol Taxonomy

    No full text
    International audienceRouting protocols in wireless sensor networks are generally focused on hierarchical infrastructures, for energy saving reasons. In this paper, we intend to give a taxonomy of these approaches identifying three criteria of classification: the assumptions, the algorithms and their evaluation. We classify projects based on these parameters and we also draw a uniform view over them, which may provide a basis of comparison for different routing protocols built atop hierarchical WSN infrastructures

    Wireless sensor network system helping navigation of the visually impaired

    No full text
    International audienceNavigation aids for the pedestrians are considered new research challenges. The visually impaired are particularly concerned, because of their need to detect and avoid obstacles, as well as to orient themselves in unknown environments. In this paper, we discuss some existing projects in this domain and we propose a novel aid system formed of wireless sensors, meant to help navigation of the visually impaired, which addresses both orientation and obstacle negotiation. The proposed system is GPS-free and does not need external assistance in navigation

    Wireless Sensor Network Infrastructure: Construction and Evaluation

    No full text
    International audienceLarge area wireless sensor deployments rely on multi-hop communications. Efficient packet transmissions and virtual topologies, which structure sensor networks, are two main features for efficient energy management in wireless sensor networks. This paper aims to present a distributed and low-cost topology construction algorithm for wireless sensor networks, addressing the following issues: large-scale, random network deployment, energy efficiency and small overhead. We propose structuring nodes in zones, meant to reduce the global view of the network to a local one. This zone-based architecture is the infrastructure used by our hierarchical routing protocol. The experimental results show that the proposed algorithm has low overhead and is scalable

    Model based rules generation for Intrusion Detection System for industrial systems

    No full text
    International audienceThe security of cyber-physical systems (CPS) is a major concern and intrusion detection systems (IDS) are used to ensure this security. Model-based IDSs rely on the CPS model to detect abnormal behaviors. In this article, a model-based IDS rule generator is proposed, which converts a system model into anomaly-based IDS rules. In addition, the effectiveness of the rules generated is proven by a case study

    Model based rules generation for Intrusion Detection System for industrial systems

    No full text
    International audienceThe security of cyber-physical systems (CPS) is a major concern and intrusion detection systems (IDS) are used to ensure this security. Model-based IDSs rely on the CPS model to detect abnormal behaviors. In this article, a model-based IDS rule generator is proposed, which converts a system model into anomaly-based IDS rules. In addition, the effectiveness of the rules generated is proven by a case study

    Model based Design of Intrusion Detection Systems for ICS

    No full text
    International audienceToday, industrial control systems (ICS) are connected to the Internet. The addition of computer capabilities to ICSs has improved performance, reduced costs, and many other benefits. However, ICSs are not designed with security in mind. These systems, therefore, present security risks related to their IT vulnerabilities. Applying IT's security solutions to the ICS are not enough due to the difference between these two systems represented by the interaction between the cyber and physical system in ICS. Hence, it seems relevant to rely on a physical model of the cyber-physical system to obtain an intrusion detection system (IDS) for those systems. Most of the IDSs are based on rules to define how the IDS would detect attacks on the system. These rules are generally used either to describe possible attacks scenarios on the systems or the normal system behavior. However, creating and maintaining handmade rules for a complex system could be very difficult. In this article, we propose a model-based approach that consists of generating IDS rules from a physical system model and the authorized behavior specification. Then we illustrate the proposed algorithm in a case study

    Model-Based approach IDS design

    No full text
    International audienceIndustrial control systems (ICSs) present security risks related to their IT vulnerabilities. However, ICS systems have more constraints that IT systems represented by the interaction between cyber and physical systems. This interaction should be taken into consideration by the security solution. Intrusion detection systems give visibility of system branches and considered as one of the solutions to ensure the proper functioning. In this paper, we propose a rule generator for IDS. This rule generator takes a physical model and converts it to a syntax understandable by the IDS. This solves the difficulty of creating and maintaining handmade rules
    corecore