Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of cryptographic protocols, both from a communication and a computation point of view, based on ...
详细信息
ISBN:
(纸本)9780769533933
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of cryptographic protocols, both from a communication and a computation point of view, based on practical measurements on the MICAz and TelosB sensors. We focus on the cost of two key agreement protocols: Kerberos and the Elliptic Curve Diffie-Hellman key exchange with authentication provided by the Elliptic Curve Digital Signature Algorithm (ECDH-ECDSA). We find that, in our context, Kerberos is around one order of magnitude less costly than the ECDH-ECDSA key exchange and confirm that it should be preferred in situations where a trusted third party is available. We also observe that the power dedicated to communications can become a central concern when the nodes need to stay in listen mode, e. g. between the protocol rounds, even when reduced using a Low Power Listening (LPL) protocol. therefore, listening should be considered when assessing the cost of cryptographic protocols on sensor nodes.
One of the key problems for Wireless sensor Networks (WSNs) is the design of energy-efficient Routing Algorithm, because sensor energy is limited, the energy-efficiency routing algorithm has a strong impact on the net...
详细信息
ISBN:
(纸本)9781424421077
One of the key problems for Wireless sensor Networks (WSNs) is the design of energy-efficient Routing Algorithm, because sensor energy is limited, the energy-efficiency routing algorithm has a strong impact on the network performance. In this paper, we present an energy-efficient minimum routing algorithm (EEMR) of wireless sensor networks. EEMR improves energy utility by changing the activity of wireless communication module of sensor nodes, energy model and state transition of sensor nodes. EEMR employs the minimum angle of source node and goal node, source node and Sink node to prolong network lifetime. Simulation results show that EEMR performs better than DD and EER algorithm for wireless sensor network with high-density deployment and low traffic.
In wireless sensor networks, the pairwise keys shared by non-compromised nodes could be compromised, then the adversary would misuse the pairwise keys to forge message report in order to destroy secure communication o...
详细信息
ISBN:
(纸本)9781424421077
In wireless sensor networks, the pairwise keys shared by non-compromised nodes could be compromised, then the adversary would misuse the pairwise keys to forge message report in order to destroy secure communication or deplete the limited resource in sensor nodes. To address this issue, in this paper, an efficient mechanism is proposed to detect misused pairwise keys. Specially, an efficient verifiable authenticator is attached to each message report, the forwarding node can detect whether the pairwise key is misused by verifying the authenticator. the security analysis and quantitative performance analysis demonstrate effectiveness and efficiency of the proposed mechanism. Moreover, the proposed mechanism can be integrated with most of key pre-distribution schemes or false data filtering schemes to provide more reliable secure communication.
distributedsystems such as clusters, clouds and grids remain a difficult platform for executing large data intensive workloads. Even sophisticated users struggle to shape complex workloads into the simple "assem...
详细信息
We consider the rate allocation problem for data aggregation in wireless sensor networks with two objectives: 1) maximizing the lifetime of a local aggregation cluster and, 2) achieving fairness among all data sources...
详细信息
ISBN:
(纸本)9780769533933
We consider the rate allocation problem for data aggregation in wireless sensor networks with two objectives: 1) maximizing the lifetime of a local aggregation cluster and, 2) achieving fairness among all data sources. the two objectives are generally correlated with each other and usually they cannot be maximized simultaneously. We adopt a lexicographic method to solve this multi-objective programming problem. First, we recursively induce the maximum lifetime for the local aggregation cluster. Under the given maximum lifetime, we then formulate the problem of maximizing fairness as a convex optimization problem, and derive the optimal rate allocation strategy. We also present low-complexity algorithms that a local aggregation cluster can use to determine the optimal rate allocation. Our simulation results validate our analytical results and illustrate the effectiveness of the approach.
WSN (Wireless sensor Network) Is constrained by limited radio propagation range as well as battery life. Multicast is an efficient method to support group communication and decrease communicating energy. It is challen...
详细信息
ISBN:
(纸本)9781424421077
WSN (Wireless sensor Network) Is constrained by limited radio propagation range as well as battery life. Multicast is an efficient method to support group communication and decrease communicating energy. It is challenging to design multicast routing protocol for WSN. the mesh-based protocol ODMRP (On-Demand Multicast Routing Protocol) is our focus. Its forwarding group can be used not only for delivering multicast traffic from base station to sensor nodes but also for reverse routing from sensor nodes to the base station to assemble data. the feasibility and improvement of ODMRP for WSN are analyzed by modeling and simulation. Results show that associated with network design including node density and initial energy we can apply ODMRP efficiently.
In most sensor network applications, the information gathered by sensors will be meaningless without the location of the sensor nodes. Node localization has been a topic of active research in recent years. Accurate se...
详细信息
ISBN:
(纸本)9781424421077
In most sensor network applications, the information gathered by sensors will be meaningless without the location of the sensor nodes. Node localization has been a topic of active research in recent years. Accurate self-localization capability is highly desirable in wireless sensor network(WSN). this paper proposes a genetic simulated annealing algorithm based localization(GSAAL) algorithm for WSN. the proposed algorithm adopts two new genetic operators: single-vertex-neighborhood mutation and the descend-based arithmetic crossover. Four example problems are used to evaluate the performance of the proposed algorithm. Simulation results show that our algorithm can achieve higher accurate position estimation than semi-definite programming with gradient search localization (SDPL) [11].
this paper covers sensor Networks, their different applications and problems encountered and in particular the routing problem which constitutes a major constraint in sensor networks today. the Modified Directional So...
详细信息
ISBN:
(纸本)9781424421077
this paper covers sensor Networks, their different applications and problems encountered and in particular the routing problem which constitutes a major constraint in sensor networks today. the Modified Directional Source Aware routing Protocol (DSAP) is presented. the goals intended were to build on the work already started on the modified DSAP algorithm for routing in a WSN network try to find the right structure for each component in the model based on its properties, then combining all of the elements in one complete structure that serves fixed and mobile users. the ideas were inspired by the GSM and TCP/IP technologies, and tend to apply some of their concepts in the model of the hospital.
As the absence of a centralized control in mobile ad hoc networks (MANET), the tradition public key infrastructure (PKI) model is not fully applicable in MANET scenarios. In this paper, we have implemented a fully dis...
详细信息
ISBN:
(纸本)9781424421077
As the absence of a centralized control in mobile ad hoc networks (MANET), the tradition public key infrastructure (PKI) model is not fully applicable in MANET scenarios. In this paper, we have implemented a fully distributed Certificate Authority (CA) which based the Identity-Based Encryption (IBE) combined withdistributed secrete sharing algorithm [1], and integrated it with an OLSR MANET. Withthe advantage of less computing and communication loss, the proposed scheme is more suit the MANET environment.
Designing of media access control (MAC) protocol is one of the major challenges in underwater acoustic sensor networks. Because of the long and changeful propagation delay, MAC protocols for traditional terrestrial se...
详细信息
ISBN:
(纸本)9781424421077
Designing of media access control (MAC) protocol is one of the major challenges in underwater acoustic sensor networks. Because of the long and changeful propagation delay, MAC protocols for traditional terrestrial sensor networks are unavailable. We propose a TDMA-based approach which is easy to dispose and energy-efficient. In brief, our MAC protocol includes the lightweight synchronization designed to suit to underwater environments, the defer time to allocate transmitting time of all nodes, the guard time to avoid collision withthe sleep strategy to save energy. Simulation results show our MAC protocol feasible and efficient, especially in the high traffic load cases.
暂无评论