• Title/Summary/Keyword: WSN security

Search Result 126, Processing Time 0.047 seconds

Biologically Inspired Node Scheduling Control for Wireless Sensor Networks

  • Byun, Heejung;Son, Sugook;Yang, Soomi
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.506-516
    • /
    • 2015
  • Wireless sensor networks (WSNs) are generally comprised of densely deployed sensor nodes, which results in highly redundant sensor data transmissions and energy waste. Since the sensor nodes depend on batteries for energy, previous studies have focused on designing energy-efficient medium access control (MAC) protocols to extend the network lifetime. However, the energy-efficient protocols induce an extra end-to-end delay, and therefore recent increase in focus on WSNs has led to timely and reliable communication protocols for mission-critical applications. In this paper, we propose an energy efficient and delay guaranteeing node scheduling scheme inspired by biological systems, which have gained considerable attention as a computing and problem solving technique.With the identification of analogies between cellular signaling systems and WSN systems, we formulate a new mathematical model that considers the networking challenges of WSNs. The proposed bio-inspired algorithm determines the state of the sensor node, as required by each application and as determined by the local environmental conditions and the states of the adjacent nodes. A control analysis shows that the proposed bio-inspired scheme guarantees the system stability by controlling the parameters of each node. Simulation results also indicate that the proposed scheme provides significant energy savings, as well as reliable delay guarantees by controlling the states of the sensor nodes.

Cooperative Data Forwarding in Border Surveillance Networks (국경감시망에서의 협력적 데이터 포워딩 방법)

  • Oh, Se-Min;Kim, Dong-Wan;An, Sun-Shin;Boudriga, Noureddine
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.196-198
    • /
    • 2014
  • Wireless Sensor Networks(WSN) 기반의 Border Surveillance Networks(BSN)는 다양한 제한조건을 동반하며 침입 혹은 환경 등을 감시함을 목적으로 하고 있기 때문에 이벤트 발생시 신뢰적인 데이터 전송은 매우 중요한 부분을 차치하게 된다. 본 논문에서 적용한 대표적인 요구기반 라우팅 방법인 Ad hoc On-demand Distance Vector Routing(AODV)는 BSN 에 적용하였을 경우 홉 수(Hop Count)를 메트릭으로 최적의 경로를 계산하고 선택하여 Uni-Path 로 데이터를 전송하게 된다. 이때 AODV 는 Uni-path 로 데이터 전송을 진행하게 되며 링크의 단절이 빈번히 발생하는 BSN 의 환경적 요인으로 데이터 전송의 신뢰성이 감소하게 될 것이며 이는 비효과적인 데이터 전송을 야기하게 된다. 따라서 본 논문에서는 Multi-path 개념을 도입하여 데이터 전송 시 링크단절에 의해 발생하는 시간의 지연을 줄이고 더욱 신뢰성 있게 데이터를 전송할 수 있는 방법을 제안한다. 제안하는 방법은 송, 수신하는 두 노드의 전송범위에 공통으로 속한 노드들이 전송되는 데이터를 중복 전송하게 된다. 그리하여 링크의 단절이 일어날 경우 발생하는 경로 재 탐색 및 경로복구의 발생 빈도를 줄이고 동시에 데이터 전송률을 증가시켜 신뢰적인 데이터 전송을 하게 된다.

DDCP: The Dynamic Differential Clustering Protocol Considering Mobile Sinks for WSNs

  • Hyungbae Park;Joongjin Kook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1728-1742
    • /
    • 2023
  • In this paper, we extended a hierarchical clustering technique, which is the most researched in the sensor network field, and studied a dynamic differential clustering technique to minimize energy consumption and ensure equal lifespan of all sensor nodes while considering the mobility of sinks. In a sensor network environment with mobile sinks, clusters close to the sinks tend to consume more forwarding energy. Therefore, clustering that considers forwarding energy consumption is desired. Since all clusters form a hierarchical tree, the number of levels of the tree must be considered based on the size of the cluster so that the cluster size is not growing abnormally, and the energy consumption is not concentrated within specific clusters. To verify that the proposed DDC protocol satisfies these requirements, a simulation using Matlab was performed. The FND (First Node Dead), LND (Last Node Dead), and residual energy characteristics of the proposed DDC protocol were compared with the popular clustering protocols such as LEACH and EEUC. As a result, it was shown that FND appears the latest and the point at which the dead node count increases is delayed in the DDC protocol. The proposed DDC protocol presents 66.3% improvement in FND and 13.8% improvement in LND compared to LEACH protocol. Furthermore, FND improved 79.9%, but LND declined 33.2% when compared to the EEUC. This verifies that the proposed DDC protocol can last for longer time with more number of surviving nodes.

Performance Analysis and Comparison of Stream Ciphers for Secure Sensor Networks (안전한 센서 네트워크를 위한 스트림 암호의 성능 비교 분석)

  • Yun, Min;Na, Hyoung-Jun;Lee, Mun-Kyu;Park, Kun-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.3-16
    • /
    • 2008
  • A Wireless Sensor Network (WSN for short) is a wireless network consisting of distributed small devices which are called sensor nodes or motes. Recently, there has been an extensive research on WSN and also on its security. For secure storage and secure transmission of the sensed information, sensor nodes should be equipped with cryptographic algorithms. Moreover, these algorithms should be efficiently implemented since sensor nodes are highly resource-constrained devices. There are already some existing algorithms applicable to sensor nodes, including public key ciphers such as TinyECC and standard block ciphers such as AES. Stream ciphers, however, are still to be analyzed, since they were only recently standardized in the eSTREAM project. In this paper, we implement over the MicaZ platform nine software-based stream ciphers out of the ten in the second and final phases of the eSTREAM project, and we evaluate their performance. Especially, we apply several optimization techniques to six ciphers including SOSEMANUK, Salsa20 and Rabbit, which have survived after the final phase of the eSTREAM project. We also present the implementation results of hardware-oriented stream ciphers and AES-CFB fur reference. According to our experiment, the encryption speeds of these software-based stream ciphers are in the range of 31-406Kbps, thus most of these ciphers are fairly acceptable fur sensor nodes. In particular, the survivors, SOSEMANUK, Salsa20 and Rabbit, show the throughputs of 406Kbps, 176Kbps and 121Kbps using 70KB, 14KB and 22KB of ROM and 2811B, 799B and 755B of RAM, respectively. From the viewpoint of encryption speed, the performances of these ciphers are much better than that of the software-based AES, which shows the speed of 106Kbps.

Secure Disjointed Multipath Routing Scheme for Multimedia Data Transmission in Wireless Sensor Networks (무선 센서 네트워크 환경에서 멀티미디어 데이터 전송을 위한 보안성 있는 비-중첩 다중 경로 라우팅 기법)

  • Lee, Sang-Kyu;Kim, Dong-Joo;Park, Jun-Ho;Seong, Dong-Ook;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.4
    • /
    • pp.60-68
    • /
    • 2012
  • In recent years, the requirements on the high quality environment monitoring by using the sensor nodes which can handle the multimedia data in WSN have been increased. However, because the volume of multimedia data is tremendous, the limited bandwidth of a wireless channel may incur the bottleneck of a system. To solve such a problem, most of the existing distributed multi-path routing protocols based on multimedia data just focused on overcoming the limited bandwidth in order to enhance the energy efficiency and the transmission rate. However, because the existing methods can not apply a key-based technique to encrypt the multimedia data, they are very weak for the security. In this paper, we propose a secure disjointed multipath routing scheme for multimedia data transmission. Since our proposed scheme divides multimedia data(eg. image) into pixels and sends them through disjointed multipath routing, it can provide security to the whole network without using the key-based method. Our experimental results show that our proposed scheme reduces about 10% the amount of the energy consumption and about 65% the amount of the missed data packets caused by malicious nodes over the existing methods on average.

A Survey of the Transmission-Power-Control Schemes in Wireless Body-Sensor Networks

  • Lee, Woosik;Kim, Heeyoul;Hong, Min;Kang, Min-Goo;Jeong, Seung Ryul;Kim, Namgi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1854-1868
    • /
    • 2018
  • A wireless body-sensor network (WBSN) refers to a network-configured environment in which sensors are placed on both the inside and outside of the human body. The sensors are much smaller and the energy is more constrained when compared to traditional wireless sensor network (WSN) environments. The critical nature of the energy-constraint issue in WBSN environments has led to numerous studies on the reduction of energy consumption of WBSN sensors. The transmission-power-control (TPC) technique adjusts the transmission-power level (TPL) of sensors in the WBSN and reduces the energy consumption that occurs during communications. To elaborate, when transmission sensors and reception sensors are placed in various parts of the human body, the transmission sensors regularly send sensor data to the reception sensors. As the reception sensors receive data from the transmission sensors, real-time measurements of the received signal-strength indication (RSSI), which is the value that indicates the channel status, are taken to determine the TPL that suits the current-channel status. This TPL information is then sent back to the transmission sensors. The transmission sensors adjust their current TPL based on the TPL that they receive from the reception sensors. The initial TPC algorithm made linear or binary adjustments using only the information of the current-channel status. However, because various data in the WBSN environment can be utilized to create a more efficient TPC algorithm, many different types of TPC algorithms that combine human movements or fuse TPC with other algorithms have emerged. This paper defines and discusses the design and development process of an efficient TPC algorithm for WBSNs. We will describe the WBSN characteristics, model, and closed-loop mechanism, followed by an examination of recent TPC studies.

A Node Scheduling Control Scheme with Time Delay Requirement in Wireless Sensor Actuator Networks (무선 센서 엑츄에이터 네트워크에서의 시간지연을 고려한 노드 스케줄링 제어 기법)

  • Byun, Heejung
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.17-23
    • /
    • 2016
  • Wireless sensor-actuator networks (WSANs) enhance the existing wireless sensor networks (WSNs) by equipping sensor nodes with an actuator. The actuators work with the sensor nodes and perform application-specific operations. The WSAN systems have several applications such as disaster relief, intelligent building, military surveillance, health monitoring, and infrastructure security. These applications require capability of reliable data transfer to act responsively and accurately. Biologically inspired modeling techniques have received considerable attention for achieving robustness, scalability, and adaptability, while retaining individual simplicity. In this paper, an epidemic-inspired algorithm for data dissemination with delay constraints while minimizing energy consumption in WSAN is proposed. The steady states and system stability are analyzed using control theory. Also, simulation results indicate that the proposed scheme provides desirable dissemination delay and energy saving.

Design and Implementation of Network Self-Configuration Based on Bluetooth (Bluetooth 기반 네트워크 자동형성 설계 및 구현)

  • Kang, Seong-Ho;Choo, Young-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1376-1384
    • /
    • 2008
  • Numerous researches on network self-configuration have been conducted on Wireless Sensor Network (WSN) and Ad Hoc network but the results have not been applied yet for factory automation. This paper presents development of intelligent process management systems conducting process monitoring and control irrelevant to physical position of a plant operator. The systems are indispensable for diagnosis of rotating machines which cannot exploit wired network. The system was implemented in a Personal Digital Assistant (PDA) using Bluetooth communication protocol. When a mobile terminal reaches to communication range of the process management server, the server detects the mobile terminal to reconfigure plant network automatically. The server authenticates a user of the terminal to download and installs monitoring and control program considering authorized level of the user. If the terminal leaves communication range of the server, it deletes the node from the network and removes the program automatically to save resources and prevent security problems such as missing terminal. Operation of developed functions was verified in a testbed emulating steel-making plant.

  • PDF

Implementation of Group Management System with Smart Phone Devices and Wireless Sensor Network (스마트폰 및 무선 센서 네트워크를 기반으로 한 그룹관리 시스템의 구현)

  • Lee, Seung-Joon;Jung, Kyung-Kwon;Lee, Hyun-Kwan;Eom, Ki-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.378-381
    • /
    • 2011
  • The group management system with Wireless Sensor Network and android application is proposed in this paper. The proposed system was composed of personal devices with sensor nodes of WSN, manager device of android platform, and the web server. The sensor node used by each group member send a data packet to the manager device every 2 seconds. The leader device displays and transmits entire information to the web server. The web server represents these information through web page. Therefore, guardians can assure their group member's safety and security on the web page. The RSSI value of each sensor node converted by computed log-normal path loss model into distance value and displays on the manager device and the web page.

  • PDF

Security Scheme for Prevent malicious Nodes in WiMAX Environment (노드간 에너지 소비를 효율적으로 분산시킨 PRML 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Nam-Kyu;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.774-784
    • /
    • 2009
  • A wireless sensor network consisting of a large number of nodes with limited battery power should minimize energy consumption at each node to prolong the network lifetime. To improve the sensitivity of wireless sensor networks, an efficient scheduling algorithm and energy management technology for minimizing the energy consumption at each node is desired. ill this paper, we propose energy-aware routing mechanism for maximum lifetime and to optimize the solution quality for sensor network maintenance and to relay node from its adjacent cluster heads according to the node"s residual energy and its distance to the base station. Proposed protocol may minimize the energy consumption at each node, thus prolong the lifetime of the system regardless of where the sink is located outside or inside the cluster. Simulation results of proposed scheme show that our mechanism balances the energy consumption well among all sensor nodes and achieves an obvious improvement on the network lifetime. To verify propriety using NS-2, proposed scheme constructs sensor networks adapt to current model and evaluate consumption of total energy, energy consumption of cluster head, average energy dissipation over varying network areas with HEED and LEACH-C.