Spelling suggestions: "subject:"aireless sensor networks"" "subject:"fireless sensor networks""
161 |
Opportunistic Routing for Enhanced Source-location Privacy in Wireless Sensor NetworksSpachos, Petros 11 January 2011 (has links)
Wireless sensor networks (WSN) are an attractive solution for a plethora of communication applications, such as unattended event monitoring and tracking. One of the looming challenges that threaten the successful deployment of these sensor networks is source-location privacy, especially when they are used to monitor sensitive objects. In order to enhance source location privacy in sensor networks, we propose the use of an opportunistic routing scheme and we examine four different approaches. In opportunistic routing, each sensor transmits the packet over a dynamic path to the destination. Every packet from the source can therefore follow a different path toward the destination, making it difficult for an adversary to backtrack hop-by-hop to the origin of the sensor communication. Through theoretical analysis, we attempt to justify the use of opportunistic routing for the source-location problem. Moreover, simulations have been conducted in order to evaluate the performance of all the proposed schemes, in terms of source-location privacy.
|
162 |
Opportunistic Routing for Enhanced Source-location Privacy in Wireless Sensor NetworksSpachos, Petros 11 January 2011 (has links)
Wireless sensor networks (WSN) are an attractive solution for a plethora of communication applications, such as unattended event monitoring and tracking. One of the looming challenges that threaten the successful deployment of these sensor networks is source-location privacy, especially when they are used to monitor sensitive objects. In order to enhance source location privacy in sensor networks, we propose the use of an opportunistic routing scheme and we examine four different approaches. In opportunistic routing, each sensor transmits the packet over a dynamic path to the destination. Every packet from the source can therefore follow a different path toward the destination, making it difficult for an adversary to backtrack hop-by-hop to the origin of the sensor communication. Through theoretical analysis, we attempt to justify the use of opportunistic routing for the source-location problem. Moreover, simulations have been conducted in order to evaluate the performance of all the proposed schemes, in terms of source-location privacy.
|
163 |
Attacking and Securing Beacon-Enabled 802.15.4 NetworksJUNG, SANG SHIN 04 May 2011 (has links)
The IEEE 802.15.4 has attracted time-critical applications in wireless sensor networks (WSNs) because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS scheme’s security still leave the 802.15.4 MAC vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 either focus on non beacon-enabled 802.15.4 or cannot defend against insider attacks for beacon-enabled 802.15.4. In this thesis, we illustrate this by demonstrating attacks on the availability and integrity of the beacon-enabled 802.15.4. To proof the attacks, we implement the attacks using Tmote Sky motes for a malicious node along with regular nodes. We show that the malicious node can freely exploit the beacon frames to compromise the integrity and availability of the network. For the defense, we present beacon-enabled MiniSec (BCN-MiniSec) and analyze its cost.
|
164 |
Distributed Algorithms for Maximizing the Lifetime of Wireless Sensor NetworksDhawan, Akshaye 05 August 2009 (has links)
Wireless sensor networks (WSNs) are emerging as a key enabling technology for applications domains such as military, homeland security, and environment. However, a major constraint of these sensors is their limited battery. In this dissertation we examine the problem of maximizing the duration of time for which the network meets its coverage objective. Since these networks are very dense, only a subset of sensors need to be in "sense" or "on" mode at any given time to meet the coverage objective, while others can go into a power conserving "sleep" mode. This active set of sensors is known as a cover. The lifetime of the network can be extended by shuffling the cover set over time. In this dissertation, we introduce the concept of a local lifetime dependency graph consisting of the cover sets as nodes with any two nodes connected if the corresponding covers intersect, to capture the interdependencies among the covers. We present heuristics based on some simple properties of this graph and show how they improve over existing algorithms. We also present heuristics based on other properties of this graph, new models for dealing with the solution space and a generalization of our approach to other graph problems.
|
165 |
CEMA: Comfort Control and Energy Management Algorithms for Use in Residential Spaces Through Wireless Sensor NetworksHenry, Rami F.Z. 26 August 2010 (has links)
In recent years, many strides have been achieved in the area of Wireless Sensor Networks (WSNs), which is leading to constant innovations in the types of applications that WSNs can support. Much advancement has also been achieved in the area of smart homes, enabling its occupants to manually and easily control their utility expenses.
In this thesis, both areas of research will be colluded for a simple, yet critical application: efficient and economical comfort control in smart residential spaces. The goal is to design a central, modular energy consumption control system for residential spaces, which manages energy consumption in all aspects of a typical residence. This thesis is concerned with two facets of energy consumption in residences. The first facet is concerned with controlling when the heating, ventilating, and air conditioning unit (HVAC) operates for each room separately. This is in contrast to a typical HVAC system where comfort is provided across the floor as a whole. The second facet is concerned with controlling the lighting in each room so as to not exceed a certain input value. The communication network that supports the realization of these coveted goals is based on Zigbee interconnected sensor nodes which pour data unto a smart thermostat which does all the required calculations and activates the modules required for comfort control and energy management, if needed.
A Java-based discrete event simulator is then written up to simulate a floor of a typical Canadian single-family dwelling. The simulation assumes error-less communication and proceeds to record certain room variables and the ongoing cost of operation periodically. These results from the simulator are compared to the results of the well known simulator, created by DesignBuilder, which describes typical home conditions. The conclusion from this analysis is that the Comfort Control and Energy Management Algorithms (CEMA) are feasible, and that their implementation incurs significant monetary savings.
|
166 |
Smart Grid Applications Using Sensor Web ServicesAsad, Omar 29 March 2011 (has links)
Sensor network web services have recently emerged as promising tools to provide remote
management, data collection and querying capabilities for sensor networks. They can
be utilized in a large number of elds among which Demand-Side Energy Management (DSEM) is an important application area that has become possible with the smart electrical power grid. DSEM applications generally aim to reduce the cost and the amount of power consumption. In the traditional power grid, DSEM has not been implemented widely due to the large number of households and lack of ne-grained automation tools. However by employing intelligent devices and implementing communication infrastructure among these devices, the smart grid will renovate the existing power grid and it will enable a wide variety of DSEM applications. In this thesis, we analyze various DSEM scenarios that become available with sensor network web services. We assume a smart home with a Wireless Sensor Network (WSN) where the sensors are mounted on the
appliances and they are able to run web services. The web server retrieves data from the appliances via the web services running on the sensor nodes. These data can be stored
in a database after processing, where the database can be accessed by the utility, as
well as the inhabitants of the smart home. We showthat our implementation is e cient in terms of running time. Moreover, the message sizes and the implementation code is
quite small which makes it suitable for the memory-limited sensor nodes. Furthermore,
we show the application scenarios introduced in the thesis provide energy saving for the
smart home.
|
167 |
Energy-Efficient Battery-Aware MAC protocol for Wireless Sensor NetworksNasrallah, Yamen 19 March 2012 (has links)
Wireless sensor networks suffer from limited power resources. Therefore, managing the energy
constraints and exploring new ways to minimize the power consumption during the operation of
the nodes are critical issues. Conventional MAC protocols deal with this problem without
considering the internal properties of the sensor nodes’ batteries. However, recent studies about
battery modeling and behaviour showed that the pulsed discharge mechanism and the charge
recovery effect may have a significant impact on wireless communication in terms of power
saving. In this thesis we propose two battery-aware MAC protocols that take benefit of these
factors to save more energy and to prolong the lifetime of the nodes/network without affecting
the throughput. In both protocols we measure the remaining battery capacity of the node and use
that measurement in the back-off scheme. The first protocol gives the nodes with higher
remaining battery capacity more priority to access the medium, while the other one provides
more medium access priority to the nodes with lower remaining battery capacity. The objective
is to investigate, through simulations, which protocol reduces the power consumption of the
nodes, improve the lifetime of the network, and compare the results with the CSMA-CA
protocol.
|
168 |
Physical Implementation of Synchronous Duty-Cycling MAC Protocols: Experiences and EvaluationXiao, Wei-Cheng 24 July 2013 (has links)
Energy consumption and network latency are important issues in wireless sensor networks. The mechanism duty cycling is generally used in wireless sensor networks for avoiding energy consumption due to idle listening. Duty cycling, however, also introduces additional latency in communication among sensors. Some protocols have been proposed to work in wireless sensor networks with duty cycling, such as S-MAC and DW-MAC. Those protocols also tried to make efficient channel utilization and to mitigate the chance of packet collision and the network latency increase resulting from collision. DW-MAC was also designed to tolerate bursty and high traffic loads without increasing energy consumption, by spreading packet transmission and node wakeup times during a cycle.
Some performance comparison between S-MAC and DW-MAC has been done in previous work; however, this comparison was performed in the ns-2 simulator only. In the real world, there are further issues not considered or discussed in the simulation, and some of those issues contribute significant influences to the MAC protocol performance. In this work, I implemented both S-MAC and DW-MAC physically on MICAz sensor motes and compared their performance through experiments. Through my implementation, experiments, and performance evaluation, hardware properties and issues that were not addressed in the previous work are presented, and their impacts on the performance are shown and discussed. I also simulated S-MAC and DW-MAC on ns-2 to give a mutual validation of the experimental results and my interpretation of the results. The experiences of physical implementations presented in this work can contribute new information and insights for helping in future MAC protocol design and implementation in wireless sensor networks.
|
169 |
DI-SEC: Distributed Security Framework for Heterogeneous Wireless Sensor NetworksValero, Marco 16 April 2012 (has links)
Wireless Sensor Networks (WSNs) are deployed for monitoring in a range of critical domains (e.g., health care, military, critical infrastructure). Accordingly, these WSNs should be resilient to attacks. The current approach to defending against malicious threats is to develop and deploy a specific defense mechanism for a specific attack. However, the problem with this traditional approach to defending sensor networks is that the solution for one attack (i.e., Jamming attack) does not defend against other attacks (e.g., Sybil and Selective Forwarding). This work addresses the challenges with the traditional approach to securing sensor networks and presents a comprehensive framework, Di-Sec, that can defend against all known and forthcoming attacks. At the heart of Di-Sec lies the monitoring core (M-Core), which is an extensible and lightweight layer that gathers information and statistics relevant for creating defense modules. Along with Di-Sec, a new user-friendly domain-specific language was developed, the M-Core Control Language (MCL). Using the MCL, a user can implement new defense mechanisms without the overhead of learning the details of the underlying software architecture (i.e., TinyOS, Di-Sec). Hence, the MCL expedites the development of sensor defense mechanisms by significantly simplifying the coding process for developers. The Di-Sec framework has been implemented and tested on real sensors to evaluate its feasibility and performance. Our evaluation shows that Di-Sec is feasible on today’s resource-limited sensors and has a nominal overhead. Furthermore, we illustrate the functionality of Di-Sec by implementing four detection and defense mechanisms for attacks at various layers of the communication stack.
|
170 |
Security in Wireless Sensor Networks for Open ControllerEngvall, Christoffer January 2013 (has links)
In this thesis we develop, evaluate and implement a security solution for Open Controllers wireless sensor network platform. A scenario is used to describe an exemplar application showing how our system is supposed to function. The security of the platform is analyzed using a well-established threat modeling process and attack trees which result in the identification of a number of risks, which could be security weaknesses. These attack trees visualize the security weaknesses in an easy to access way even for individuals without special security expertise. We develop a security solution to counter these identified risks. The developed security solution consists of three different security levels together with a number of new security policies. Each additional level applies different security mechanisms to provide increasingly improved security for the platform. The new security policies ensure that the security solution is continuously secure during its operating time. We implement part of the security solution in the Contiki operating system to assess its function in practice. Finally we evaluate the developed security solution by looking back to the previously identified weaknesses and the implementation proving that the security solution mitigates the risks.
|
Page generated in 0.0776 seconds