• Title/Summary/Keyword: Unattended Wireless Sensor Network

Search Result 13, Processing Time 0.025 seconds

Routing Algorithm of Wireless Sensor Network for Building Automation System (빌딩 자동화를 위한 무선 센서 네트워크 라우팅 프로토콜)

  • Lu, Delai;Hong, Seung-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.45-47
    • /
    • 2009
  • Wireless Sensor Network(WSN) has been very popular in unattended surveillance systems recently. For Applying WSN into Building Automation system(BAS), a novel hierarchial network structure and static routing algorithm which eliminates the scalability limitation of Zigbee are proposed in this paper. The static routing algorithm relying on the hierarchial network address reduces the computational complexity to a great extent and has a real-time performance which satisfies urgent applications well.

  • PDF

Study on the OMAC-SNEP for Unattended Security System Using Wireless Sensor Networks (무선 센서 네트워크를 이용한 무인 경비 시스템에서의 OMAC-SNEP 기술에 관한 연구)

  • Lee Seong-Jae;Kim Hak-Beom;Youm Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.105-114
    • /
    • 2006
  • Ubiquitous Sensor Network consists of a number of sensor nodes with a limited computation power and limited communication capabilities, and a sensor node is able to communicate with each other at anytime and in any place. Due to the rapid research and development in sensor networks, it will rapidly grow into environments where hmm beings can interact in an intuitive way with sensing objects which can be PDAs, sensors, or even clothes in the future. We are aiming at realizing an Unattended Secure Security System to apply it to Ubiquitous Sensor Network. In this paper, the vulnerabilities in the Unattended security system are identified, and a new protocol called OMAC-SNEP is proposed for the Unattended Secure Security System. Because the CBC-MAC in SNEP is not secure unless the message length is fixed, the CBC-MAC in SNEP was replaced with OMAC in SNEP. We have shown that the proposed protocol is secure for my bit length of messages and is almost as efficient as the CBC-MAC with only one key. OMAC-SNEP can be used not only in Unattended Security System, but also any other Sensor Networks.

WiSeMote: a novel high fidelity wireless sensor network for structural health monitoring

  • Hoover, Davis P.;Bilbao, Argenis;Rice, Jennifer A.
    • Smart Structures and Systems
    • /
    • v.10 no.3
    • /
    • pp.271-298
    • /
    • 2012
  • Researchers have made significant progress in recent years towards realizing effective structural health monitoring (SHM) utilizing wireless smart sensor networks (WSSNs). These efforts have focused on improving the performance and robustness of such networks to achieve high quality data acquisition and distributed, in-network processing. One of the primary challenges still facing the use of smart sensors for long-term monitoring deployments is their limited power resources. Periodically accessing the sensor nodes to change batteries is not feasible or economical in many deployment cases. While energy harvesting techniques show promise for prolonging unattended network life, low power design and operation are still critically important. This research presents the WiSeMote: a new, fully integrated ultra-low power wireless smart sensor node and a flexible base station, both designed for long-term SHM deployments. The power consumption of the sensor nodes and base station has been minimized through careful hardware selection and the implementation of power-aware network software, without sacrificing flexibility and functionality.

Enhancing Method to make Cluster for Filtering-based Sensor Networks (여과기법 보안효율을 높이기 위한 센서네트워크 클러스터링 방법)

  • Kim, Byung-Hee;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.141-145
    • /
    • 2008
  • Wireless sensor network (WSN) is expected to be used in many applications. However, sensor nodes still have some secure problems to use them in the real applications. They are typically deployed on open, wide, and unattended environments. An adversary using these features can easily compromise the deployed sensor nodes and use compromised sensor nodes to inject fabricated data to the sensor network (false data injection attack). The injected fabricated data drains much energy of them and causes a false alarm. To detect and drop the injected fabricated data, a filtering-based security method and adaptive methods are proposed. The number of different partitions is important to make event report since they can make a correctness event report if the representative node does not receive message authentication codes made by the different partition keys. The proposed methods cannot guarantee the detection power since they do not consider the filtering scheme. We proposed clustering method for filtering-based secure methods. Our proposed method uses fuzzy system to enhance the detection power of a cluster.

  • PDF

Study of Operating μTESLA in Multi-hop Unattended WSN (멀티 홉 UWSN 환경에서의 μTESLA 운영에 관한 고찰)

  • Choi, JinChun;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.459-470
    • /
    • 2013
  • ${\mu}TESLA$ is well known as the most representative energy-efficient broadcast authentication method. Until now, there are many researches that figure out the problems or limitation of ${\mu}TESLA$ and mitigate or solve them, but most researches have been verified in the environment far from the real world. We consider the necessity of verifying what the real efficiency of ${\mu}TESLA$ is. In this paper, we assume that sensors that continuously repeat hibernation and activity perform communication under the UWSN(Unattended WSN), which BS does not stay in the network. In this environment, we newly inspect the performance of ${\mu}TESLA$ by performing various simulations.

Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey

  • Hong, Sung-Hyuck;Lim, Sun-Ho;Song, Jae-Ki
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.805-821
    • /
    • 2011
  • Wireless Sensor Networks (WSNs) are rapidly emerging because of their potential applications available in military and civilian environments. Due to unattended and hostile deployment environments, shared wireless links, and inherent resource constraints, providing high level security services is challenging in WSNs. In this paper, we revisit various security attack models and analyze them by using a well-known standard notation, Unified Modeling Language (UML). We provide a set of UML collaboration diagram and sequence diagrams of attack models witnessed in different network layers: physical, data/link, network, and transport. The proposed UML-based analysis not only can facilitate understanding of attack strategies, but can also provide a deep insight into designing/developing countermeasures in WSNs.

Modified Passive Clustering Algorithm for Wireless Sensor Network

  • AI Eimon Akhtar Rahman;HONG Choong Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.427-429
    • /
    • 2005
  • Energy efficiency is the most challenging issue in wireless sensor network to prolong the life time of the network, as the sensors has to be unattended. Cluster based communication can reduce the traffic on the network and gives the opportunity to other sensors for periodic sleep and thus save energy. Passive clustering (PC) can perform a significant role to minimize the network load as it is less computational and light weight. First declaration wins method of PC without any priority generates severe collision in the network and forms the clusters very dense with large amount of overlapping region. We have proposed several modifications for the existing passive clustering algorithm to prolong the life time of the network with better cluster formation.

  • PDF

An Energy and Coverage Efficient Clustering Method for Wireless Sensor Network (무선 센서 네트워크를 위한 효율적인 에너지와 커버리지 클러스터링 방법)

  • Gong, Ji;Zhang, Kai;Kim, Seung-Hae;Cho, Gi-Hwan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06a
    • /
    • pp.261-262
    • /
    • 2008
  • Due to technological advances, the manufacturing of small and low cost of sensors becomes technically and economically feasible. In recent years, an increasing interest in using Wireless Sensor Network (WSN) in various applications, including large scale environment monitoring, battle field surveillance, security management and location tracking. In these applications, hundreds of sensor nodes are left to be unattended to report monitored data to users. Since sensor nodes are placed randomly and sometimes are deployed in underwater. It is impossible to replace batteries often when batteries run out. Therefore, reducing energy consumption is the most important design consideration for sensor networks.

  • PDF

Positioning of the Base Station at Wireless Sensor Network (무선 센서 네트워크에서 기지국의 위치선정)

  • Cho, Do-Hyeoun;Lee, Jong-Young;Lee, Sang-Hun;Choi, Jin-Tak
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.1189-1190
    • /
    • 2008
  • Wireless sensor networks (WSN) have attracted much attention in recent years due to their potential use in many applications such as border protection and combat field surveillance. Given the criticality of such applications, maintaining a dependable operation of the network is a fundamental objective. However, the resource constrained nature of sensor nodes and the ad-hoc formation of the network, often coupled with an unattended deployment, pose non-conventional challenges and motivate the need for special techniques for dependable design and management of WSN. In this article, we highlight the potential of careful positioning of the base station (BS), which acts as a sink resources.

  • PDF

Operating μTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN (멀티 홉 Unattended WSN에서 가변 키 슬롯 기반 μTESLA의 운영)

  • Choi, JinChun;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.223-233
    • /
    • 2014
  • As a broadcast message authentication method in wireless sensor networks, ${\mu}$TESLA enables sensor nodes efficiently authenticate message from base station (BS). However, if we use ${\mu}$TESLA that has very short length of key slot in unattended wireless sensor network (UWSN), sensors may calculate a huge amount of hashs at once in order to verify the revealed secret key. In contrast, if we set the length of ${\mu}$TESLA's key slot too long in order to reduce the amount of hashs to calculate, BS should wait out the long slot time to release key. In this paper, we suggest variable key slot ${\mu}$TESLA in order to mitigate the problem. As showing experiment results, we prove that our suggestion improve sensor node's response time and decrease of number of hash function calculation.