Random pairwise key pre-distribution schemes have been adopted extensively as a preferred approach to pairwise key agreement problem in distributedsensor networks. However, their practical applicability is threatened...
详细信息
ISBN:
(纸本)9781424425747
Random pairwise key pre-distribution schemes have been adopted extensively as a preferred approach to pairwise key agreement problem in distributedsensor networks. However, their practical applicability is threatened by the key-swapping collusion attack whose goal is to ruin critical applications that require collaborative efforts. In this paper, we propose a lightweight framework for thwarting the attack Our framework is a winning combination of intermittent deployment strategy and one-way hash chain. the framework thereby evades undesirable requirements of functionalities and resources, topological pre-deployment knowledge, or costly location-based detection algorithms, yet maintaining network scalability. Moreover, the in-depth analysis shows in the optimistic situation the framework not only completely defeats the attack but also diminishes usability of non-collusion compromised nodes to attackers. Meanwhile, it still maintains network resilience at a remarkable level in the worst situation. Finally, the performance overheads are analysed to be acceptable for use in the current sensor node generation.
In unattended Wireless sensor Networks (WSNs), data is stored locally or at designated nodes upon sensing, and users can access it on demand. this paradigm can improve energy efficiency by making use of the upcoming c...
详细信息
ISBN:
(纸本)9780769534923
In unattended Wireless sensor Networks (WSNs), data is stored locally or at designated nodes upon sensing, and users can access it on demand. this paradigm can improve energy efficiency by making use of the upcoming cheap and large flash memory, as well as system robustness. Nevertheless, the security and dependability of distributed storage are critical for the applicability of such WSNs. In this paper, we propose a secure and dependable data storage scheme by taking advantages of secret sharing and Reed-Solomon code, which has computational security and yet maintains optimal data size. the extensive analysis verifies our scheme can provide secure and dependable data storage in WSNs in the presence of node compromise and Byzantine failure.
Many event-driven localization methods have been as low cost, energy efficient solutions for wireless senor networks. In order to eliminate the requirement of accurately controlled events in existing approaches, we pr...
详细信息
ISBN:
(纸本)9781424431748
Many event-driven localization methods have been as low cost, energy efficient solutions for wireless senor networks. In order to eliminate the requirement of accurately controlled events in existing approaches, we present a practical design using totally uncontrolled events for stationary sensor node positioning. the novel idea of this design is to estimate boththe event generation parameters and the location of each sensor node by processing node sequences easily obtained from uncontrolled event distribution. To demonstrate the generality of our design, both straight line scan and circular wave propagation events are addressed in this paper, and we evaluated our approach through theoretical analysis, extensive simulation and a physical testbed implementation with 41 MICAz motes. the evaluation results illustrate Mat with only randomly generated events, our solution can effectively localize sensor nodes with excellent flexibility while adding no extra cost at the resource constrained sensor node side. In addition, localization using uncontrolled events provides a nice potential option of achieving node positioning through natural ambient events.
We propose scalable models and centralized heuristics for the concurrent and coordinated movement of multiple sinks in a wireless sensor network (WSN). the proposed centralized heuristic runs in polynomial time given ...
详细信息
ISBN:
(纸本)9781424425747
We propose scalable models and centralized heuristics for the concurrent and coordinated movement of multiple sinks in a wireless sensor network (WSN). the proposed centralized heuristic runs in polynomial time given the solution to the linear program and achieves results that are within 2% of the LP-relaxation-based upper bound. It provides a useful benchmark for evaluating centralized and distributed schemes for controlled sink mobility.
Connected dominating sets (CDSs) are probably the most common way of constructing virtual backbones for broadcasting operation in wireless sensor networks. this is because such backbones guarantee to reduce unnecessar...
详细信息
ISBN:
(纸本)9780769534343
Connected dominating sets (CDSs) are probably the most common way of constructing virtual backbones for broadcasting operation in wireless sensor networks. this is because such backbones guarantee to reduce unnecessary message transmissions or flooding in the network. In this paper we propose a simple localized algorithm to construct a small-sized CDS. Considering the sensors deployed in the plane, our main idea is based on the computation of convex hulls of sensor nodes (nodes are considered points in the plane) in a localized manner and a simple coloring scheme, which produces a CDS in unit disk graphs whose size is at most 38 * vertical bar MCDS vertical bar where vertical bar MCDS vertical bar is the size of a minimum CDS. To the best of our knowledge, this is a significant improvement over the best published results in the same context [5]. We also analyze grids and trees to compute the exact approximation ratios for the problem. We show that our algorithm produces an optimal CDS if the graph is a tree and in the case of grids the approximation factor is 2.
Wireless sensor networks are hard to be stable and vulnerable to various attacks, so it's a need to find the mechanisms to evaluate trustworthiness with trusted computingtheories. In this paper, a novel entropy-b...
详细信息
ISBN:
(纸本)9780769532875
Wireless sensor networks are hard to be stable and vulnerable to various attacks, so it's a need to find the mechanisms to evaluate trustworthiness with trusted computingtheories. In this paper, a novel entropy-based trust modeling and evaluation methods for WSNs are carried out to give the stability and security descriptions. Withthe experiments, it is proved that they can be used to detect the malicious nodes, to estimate the effect and the performance of WSN.
this paper presents a novel architectural solution to address the problem of scalable routing in very large sensor networks. We develop a routing solution Off-Network Control Processing (ONCP) that achieves control sc...
详细信息
ISBN:
(纸本)9781424425747
this paper presents a novel architectural solution to address the problem of scalable routing in very large sensor networks. We develop a routing solution Off-Network Control Processing (ONCP) that achieves control scalability in large sensor networks by shifting certain amount of routing functions to an "off-network" server. A tiered and hybrid routing approach, consisting of "coarse grain" global routing, and distributed "fine grain" local routing is proposed for achieving scalability by avoiding network wide control message dissemination. We present the ONCP architectural concepts and analytically characterize its performance in relations to both flat and hierarchical sensor routing architectures. We also show ns2 based experimental results indicating that for large sensor networks with realistic data models, the packet drop, latency and energy performance of ONCP can be significantly better than those for flat and cluster-based protocols.
this paper addresses issues associated with modeling and simulation of wireless, mobile, and ad hoc networks. Particular attention is paid to an approach for federating parallel and distributed ad hoc networks simulat...
详细信息
ISBN:
(纸本)9780769533933
this paper addresses issues associated with modeling and simulation of wireless, mobile, and ad hoc networks. Particular attention is paid to an approach for federating parallel and distributed ad hoc networks simulators. We describe the design, functionality, implementation and performance of MobASim system. It is a Java-based software platform for MANETs simulation performed on parallel computers or computer clusters. the practical application is provided to illustrate the operation and efficiency of the presented software tool.
the proliferation of wireless and mobile devices has fostered the demand of context aware applications. Location is one of the most significant contexts. Multi-lateration, as a basic building block of localization, ho...
详细信息
ISBN:
(纸本)9781424431748
the proliferation of wireless and mobile devices has fostered the demand of context aware applications. Location is one of the most significant contexts. Multi-lateration, as a basic building block of localization, however have not yet overcome the challenges of (1) poor ranging measurement;(2) dynamic and noisy environments;(3) fluctuations in wireless communications. Hence, they often suffer poor accuracy and can hardly be employed in practical applications. In this study, we propose Quality of Trilateration (QoT) that quantifies the geometric relationship of objects and the ranging noise. Based on QoT, we design a confidence based iterative localization scheme, in which nodes dynamically select trilaterations withthe highest quality for localization. To validate this design, a wireless sensor network prototype is deployed and results show that QoT well represents trilateration accuracy, and the proposed scheme significantly improve localization performances.
With a variety of attacks, this paper proposes a novel solution which requires establishing a trust among all nodes in mobile sensor networks and develops a material scheme which can achieve the goal. the scheme inclu...
详细信息
ISBN:
(纸本)9780769534923
With a variety of attacks, this paper proposes a novel solution which requires establishing a trust among all nodes in mobile sensor networks and develops a material scheme which can achieve the goal. the scheme includes a mechanism to establish a trusted relation between all neighboring nodes and avoid untrustworthy nodes during the route discovery process. And it can resist DoS-style flooding attacks. the work presents this scheme, and reports its performance using an extensive set of simulation set of experiments. the results indicate clearly that resisting DoS can he achieved in wireless sensor network. And the additional overhead of our scheme is reasonably low.
暂无评论