7 research outputs found

    Secure data aggregation protocol for wireless sensor network

    Get PDF
    In this work, the relationship between security and data aggregation protocols has been investigated. Providing security causes more energy consumption due high computation requirements. Therefore, a method is needed to facilitate energy consumption. Combining security with data aggregation is beneficial because data aggregation protocols decrease the amount of communications that reduce energy expenditure of redundant transmissions. In this project, Data Aggregation and Authentication protocol (DAA) is simplified called SDAA and implemented in order to detect false data along with data aggregation and confidentiality. The main goal of this particular algorithm is to find false data as early as possible to decrease data transmissions. In DAA there are three steps which are: Monitoring node selection, forming pair of nodes and integration of false data detection along with data aggregation and confidentiality as SDFC algorithm. In order to simplify DAA the first two steps have been predefined prior to network deployment. Besides, monitoring nodes are assumed to be sensing nodes which sense plain data. Eight different experiments are performed where in each experiments the number of data aggregators or number of monitoring nodes are varied. TelosB motes were deployed and all of results that relate to this particular sensor node with its constraints are analyzed. Consequently, with the aid of false data detection along with the data aggregation total amount of transmission compared to traditional methods decreased tremendously. Although the number of computations increased, the energy conserved by applying data aggregation and false data detection is more than other similar methods that detects false data at the base station. In this work, the number of transmissions of packets decreases from approximately 4000 to 2500 packets which shows the efficiency of SDAA protocol. However, when number of monitoring nodes increased the amount of packet loss and end-to-end delay also increased. In this project, to facilitate packet loss and end-to-end delay synchronization of monitoring nodes has been utilized. Moreover, with the aid of synchronization the end-to-end delay decreased from 17583 (ms) to 679 (ms) and the amount of packet loss improved from 85% to only 18%

    A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Get PDF
    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided

    A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Get PDF
    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided

    Feasibility of electromagnetic communication in underwater wireless sensor networks

    No full text
    Underwater Wireless Sensor networks (UWSNs) comprised of a number of sensor nodes that are deployed to perform collaborative monitoring tasks. Sensor nodes are connected to each other through wireless signals. Acoustic signal is the dominant wave used for UWSNs communications. Acoustic signals face a lot of challenges such as ambient noise, manmade noise, limited bandwidth, multipath and low propagation speed. These challenges become more severe in shallow water environment where a high level of ambient and manmade noise, turbidity and multipath is available. Therefore, Electromagnetic signals can be applied for using as a communication signal for UWSNs. In this work, the performance of electromagnetic communication in the water environment is investigated. The investigation is conducted for fresh and seawater environment. Results show that freshwater environment can permit short range communication while the communication is more difficult for seawater due to the high value of attenuation

    Feasibility of electromagnetic communication in underwater wireless sensor networks

    No full text
    Underwater Wireless Sensor networks (UWSNs) comprised of a number of sensor nodes that are deployed to perform collaborative monitoring tasks. Sensor nodes are connected to each other through wireless signals. Acoustic signal is the dominant wave used for UWSNs communications. Acoustic signals face a lot of challenges such as ambient noise, manmade noise, limited bandwidth, multipath and low propagation speed. These challenges become more severe in shallow water environment where a high level of ambient and manmade noise, turbidity and multipath is available. Therefore, Electromagnetic signals can be applied for using as a communication signal for UWSNs. In this work, the performance of electromagnetic communication in the water environment is investigated. The investigation is conducted for fresh and seawater environment. Results show that freshwater environment can permit short range communication while the communication is more difficult for seawater due to the high value of attenuation

    Energy evaluation of data aggregation and authentication protocol (DAA) in wireless sensor networks

    No full text
    While security is an important feature in wireless sensor networks, but the energy constraints of sensor nodes should also be considered. In this work, the energy expenditure of such authentication protocol has been investigated respect to TelosB energy consumption behavior. Data Aggregation and Authentication protocol (DAA) integrates false data detection with data aggregation and confidentiality. DAA computes several Message Authentication Codes (MACs) and performs data aggregation along the path. Furthermore, integrity verification is carried out from source to destination. To evaluate precisely the energy efficiency of the scheme in the real world, a test bed implementation of DAA protocol is compared in terms of energy consumption with another authentication protocol. It is shown when the network is under attack and the amount of false data is high, DAA greatly outperforms traditional authentication techniques
    corecore