• Title/Summary/Keyword: Small Scale Sensor Networks

Search Result 20, Processing Time 0.027 seconds

A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

  • Raazi, Syed Muhammad Khaliq-Ur-Rahman;Lee, Sung-Young
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.1
    • /
    • pp.23-51
    • /
    • 2010
  • Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.

Memory-Efficient Hypercube Key Establishment Scheme for Micro-Sensor Networks

  • Lhee, Kyung-Suk
    • ETRI Journal
    • /
    • v.30 no.3
    • /
    • pp.483-485
    • /
    • 2008
  • A micro-sensor network is comprised of a large number of small sensors with limited memory capacity. Current key-establishment schemes for symmetric encryption require too much memory for micro-sensor networks on a large scale. In this paper, we propose a memory-efficient hypercube key establishment scheme that only requires logarithmic memory overhead.

  • PDF

EETS : Energy- Efficient Time Synchronization for Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율성을 고려한 시간 동기 알고리즘)

  • Kim, Soo-Joong;Hong, Sung-Hwa;Eom, Doo-Seop
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.322-330
    • /
    • 2007
  • Recent advances in wireless networks and low-cost, low-power design have led to active research in large-scale networks of small, wireless, low power sensors and actuators, In large-scale networks, lots of timing-synchronization protocols already exist (such as NTP, GPS), In ad-hoc networks, especially wireless sensor networks, it is hard to synchronize all nodes in networks because it has no infrastructure. In addition, sensor nodes have low-power CPU (it cannot perform the complex computation), low batteries, and even they have to have active and inactive section by periods. Therefore, new approach to time synchronization is needed for wireless sensor networks, In this paper, I propose Energy-Efficient Time Synchronization (EETS) protocol providing network-wide time synchronization in wireless sensor networks, The algorithm is organized two phase, In first phase, I make a hierarchical tree with sensor nodes by broadcasting "Level Discovery" packet. In second phase, I synchronize them by exchanging time stamp packets, And I also consider send time, access time and propagation time. I have shown the performance of EETS comparing Timing-sync Protocol for Sensor Networks (TPSN) and Reference Broadcast Synchronization (RBS) about energy efficiency and time synchronization accuracy using NESLsim.

  • PDF

Survey on Security in Wireless Sensor

  • Li, Zhijun;Gong, Guang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.233-248
    • /
    • 2008
  • Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). There are numerous applications for wireless sensor networks, and security is vital for many of them. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the lack of infrastructure, all of which impose unique security challenges and make innovative approaches desirable. In this paper, we present a survey on security issues in wireless sensor networks. We address several network models for security protocols in WSNs, and explore the state of the art in research on the key distribution and management schemes, typical attacks and corresponding countermeasures, entity and message authentication protocols, security data aggregation, and privacy. In addition, we discuss some directions of future work.

A High Efficient Piezoelectric Windmill using Magnetic Force for Low Wind Speed in Wireless Sensor Networks

  • Yang, Chan Ho;Song, Yewon;Jhun, Jeongpil;Hwang, Won Seop;Hong, Seong Do;Woo, Sang Bum;Sung, Tae Hyun;Jeong, Sin Woo;Yoo, Hong Hee
    • Journal of the Korean Physical Society
    • /
    • v.73 no.12
    • /
    • pp.1889-1894
    • /
    • 2018
  • An innovative small-scale piezoelectric energy harvester has been proposed to gather wind energy. A conventional horizontal-axis wind power generation has a low generating efficiency at low wind speed. To overcome this weakness, we designed a piezoelectric windmill optimized at low-speed wind. A piezoelectric device having high energy conversion efficiency is used in a small windmill. The maximum output power of the windmill was about 3.14 mW when wind speed was 1.94 m/s. Finally, the output power and the efficiency of the system were compared with a conventional wind power system. This work will be beneficial for the piezoelectric energy harvesting technology to be applied to the real world such as wireless sensor networks (WSN).

KMMR: An Efficient and scalable Key Management Protocol to Secure Multi-Hop Communications in large scale Wireless Sensor Networks

  • Guermazi, Abderrahmen;Belghith, Abdelfettah;Abid, Mohamed;Gannouni, Sofien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.901-923
    • /
    • 2017
  • Efficient key distribution and management mechanisms as well as lightweight ciphers are the main pillar for establishing secure wireless sensor networks (WSN). Several symmetric based key distribution protocols are already proposed, but most of them are not scalable, yet vulnerable to a small number of compromised nodes. In this paper, we propose an efficient and scalable key management and distribution framework, named KMMR, for large scale WSNs. The KMMR contributions are three fold. First, it performs lightweight local processes orchestrated into upward and downward tiers. Second, it limits the impact of compromised nodes to only local links. Third, KMMR performs efficient secure node addition and revocation. The security analysis shows that KMMR withstands several known attacks. We implemented KMMR using the NesC language and experimented on Telosb motes. Performance evaluation using the TOSSIM simulator shows that KMMR is scalable, provides an excellent key connectivity and allows a good resilience, yet it ensures both forward and backward secrecy. For a WSN comprising 961 sensor nodes monitoring a 60 hectares agriculture field, KMMR requires around 2.5 seconds to distribute all necessary keys, and attains a key connectivity above 96% and a resilience approaching 100%. Quantitative comparisons to earlier work show that KMMR is more efficient in terms of computational complexity, required storage space and communication overhead.

Policy for planned placement of sensor nodes in large scale wireless sensor network

  • Sharma, Vikrant;Patel, R.B;Bhadauria, HS;Prasad, D
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3213-3230
    • /
    • 2016
  • Sensor node (SN) is a crucial part in any remote monitoring system. It is a device designed to monitor the particular changes taking place in its environs. Wireless sensor network (WSN) is a system formed by the set of wirelessly connected SNs placed at different geographical locations within a target region. Precise placement of SNs is appreciated, as it affects the efficiency and effectiveness of any WSN. The manual placement of SNs is only feasible for small scale regions. The task of SN placement becomes tedious, when the size of a target region is extremely large and manually unreachable. In this research article, an automated mechanism for fast and precise deployment of SNs in a large scale target region has been proposed. It uses an assembly of rotating cannons to launch the SNs from a moving carrier helicopter. The entire system is synchronized such that the launched SNs accurately land on the pre-computed desired locations (DLs). Simulation results show that the proposed model offers a simple, time efficient and effective technique to place SNs in a large scale target region.

Alternative tactile sensor for measuring rehabilitation study using to neural network (신경망을 적용한 재활훈련 측정용 대체 촉각 센서 연구)

  • Lim, Seung-Cheol;Jin, Go-Whan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.23-29
    • /
    • 2012
  • Injured peoples usually care their body at medical institutions. But if they need some more rehabilitation to the affected area thus exist. These medical institutions according to the scale there are significant differences in rehabilitation programs, most of the small-scale rehabilitation program for medical doctors and patients to be progression of the conversation is an issue. In this paper, in a small medical facility rehabilitation to assist in the accuracy and reliability, physical contact and force sensors that can measure a combination of substitution and the tactile sensor and tactile sensor alternative with a similar function is proposed. Perceptron neural networks by applying the contact evaluation according to the algorithm to determine the pattern is applied.

GEOP : A Security Aware Multipath Routing Protocol (GEOP : 보안 인식 다중경로 라우팅 프로토콜)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.151-157
    • /
    • 2010
  • Rapid technological advances in the area of micro electro-mechanical systems (MEMS) have spurred the development of small inexpensive sensors capable of intelligent sensing. A significant amount of research has been done in the area of connecting large numbers of these sensors to create robust and scalable Wireless Sensor Networks (WSNs). The resource scarcity, ad-hoc deployment, and immense scale of WSNs make secure communication a particularly challenging problem. Since the primary consideration for sensor networks is energy efficiency, security schemes must balance their security features against the communication and computational overhead required to implement them. In this paper, we combine location information and probability to create a new security aware multipath geographic routing protocol. The implemented result in network simulator (ns-2) showed that our protocol has a better performance under attacks.

An Energy and Coverage Efficient Clustering Method for Wireless Sensor Network (무선 센서 네트워크를 위한 효율적인 에너지와 커버리지 클러스터링 방법)

  • Gong, Ji;Zhang, Kai;Kim, Seung-Hae;Cho, Gi-Hwan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06a
    • /
    • pp.261-262
    • /
    • 2008
  • Due to technological advances, the manufacturing of small and low cost of sensors becomes technically and economically feasible. In recent years, an increasing interest in using Wireless Sensor Network (WSN) in various applications, including large scale environment monitoring, battle field surveillance, security management and location tracking. In these applications, hundreds of sensor nodes are left to be unattended to report monitored data to users. Since sensor nodes are placed randomly and sometimes are deployed in underwater. It is impossible to replace batteries often when batteries run out. Therefore, reducing energy consumption is the most important design consideration for sensor networks.

  • PDF