Key Management is a major challenge to achieve security in wireless sensor networks. In most of the schemes presented for key management in wireless sensor networks, it is assumed that the sensor nodes have the same c...
详细信息
ISBN:
(纸本)9780769534923
Key Management is a major challenge to achieve security in wireless sensor networks. In most of the schemes presented for key management in wireless sensor networks, it is assumed that the sensor nodes have the same capability. the recent research has shown that the survivability of the network can be improved if sensor nodes are grouped in clusters in which a powerful cluster head assigned. However, to gain advantages of clustering in order to find an efficient key management scheme needs more research. In this paper, we investigate the key management in cluster-based wireless sensor networks using both private and public key cryptography. Our goal is to introduce a platform. in which public key cryptography is used to establish a secure link between sensor nodes and gateways. Instead of pre-loading a large number of keys into the sensor nodes, each node requests a session key from the gateway to establish a secure link with its neighbors after clustering phase. the security analysis and performance evaluation show that the proposed scheme has significant saving in storage space, transmission overhead, and perfect resilience against node capture.
Gossip algorithms for distributed computation are attractive due to their simplicity, distributed nature, and robustness in noisy and uncertain environments. However, using standard gossip algorithms can lead to a sig...
详细信息
Gossip algorithms for distributed computation are attractive due to their simplicity, distributed nature, and robustness in noisy and uncertain environments. However, using standard gossip algorithms can lead to a significant waste of energy by repeatedly recirculating redundant information. For realistic sensor network model topologies like grids and random geometric graphs, the inefficiency of gossip schemes is related to the slow mixing times of random walks on the communication graph. We propose and analyze an alternative gossiping scheme that exploits geographic information. By utilizing geographic routing combined with a simple resampling method, we demonstrate substantial gains over previously proposed gossip protocols. For regular graphs such as the ring or grid, our algorithm improves standard gossip by factors of n and root n, respectively. For the more challenging case of random geometric graphs, our algorithm computes the true average to accuracy E using O((n(1.5)/root log n) log epsilon(-1)) radio transmissions, which yields a root n/log n factor improvement over standard gossip algorithms. We illustrate these theoretical results with experimental comparisons between our algorithm and standard methods as applied to various classes of random fields.
Most papers on sensing in wireless sensor networks use only very simple sensors, e.g. humidity or temperature, to illustrate their concepts. However, in a large number of scenarios including structural health monitori...
详细信息
ISBN:
(数字)9783540691709
ISBN:
(纸本)9783540691693
Most papers on sensing in wireless sensor networks use only very simple sensors, e.g. humidity or temperature, to illustrate their concepts. However, in a large number of scenarios including structural health monitoring, more complex sensors that usually employ medium to high frequency sampling and post-processing are required. Additionally, to capture an event completely several sensors of different types are needed which have to be in range of the event and used in a timely manner. We study the problem of time-bounded and space-bounded sensing where parallel use of different sensors on the same node is impossible and not all nodes possess all required sensors. We provide a model formalizing the requirements and present algorithms for spatial grouping and temporal scheduling to tackle these problems.
Wireless sensor networks have been extensively adopted in numerous application scenarios. However, increasing environmental constraints and performance requirements has spurred the development of tools to expedite dep...
详细信息
ISBN:
(纸本)9780769534923
Wireless sensor networks have been extensively adopted in numerous application scenarios. However, increasing environmental constraints and performance requirements has spurred the development of tools to expedite deployment and minimize human intervention. this study extends previous work by the authors in network development and aims at the performance evaluation of applications operating in to-be-deployed networks. We prove that the determination of a ZigBee cluster free over an underlying network is A(P-hard and propose an algorithm for generating tree topology. Based on the proposed algorithm/technologies, an integrated development tool is developed. the capability of the tool is demonstrated by a case study of the system deployed in an office building.
In this paper we present Airtime Deficit Round Robin (ADRR) a novel scheduling algorithm for ieee 802.11-based wireless mesh networks. ADRR enhances the Deficit Round Robin scheduling discipline by taking into account...
详细信息
ISBN:
(纸本)9781424425747
In this paper we present Airtime Deficit Round Robin (ADRR) a novel scheduling algorithm for ieee 802.11-based wireless mesh networks. ADRR enhances the Deficit Round Robin scheduling discipline by taking into account the channel quality experienced by the transmitting node. the devised algorithm addresses the ieee 802.11 performance anomaly, preventing a node which experiences poor channel conditions from monopolizing the wireless medium lowering the performance of the whole system. the proposed approach combines link scheduling with measurable routing metrics typically available in WMNs. Results show the ability of the ADRR scheduler to achieve performance isolation among links characterized by heterogeneous channel conditions. the proposed solution has been implemented and tested over an ieee 802.11-based wireless mesh network. Source code has been released under a BSD License making it fully available to the research community.
Wireless sensor networks have a wide variety of applications in both military and civil environment [1]. sensor nodes monitor some surrounding environmental phenomenon, process the data obtained and forward this data ...
详细信息
ISBN:
(纸本)9780769532639
Wireless sensor networks have a wide variety of applications in both military and civil environment [1]. sensor nodes monitor some surrounding environmental phenomenon, process the data obtained and forward this data towards a base station located on the periphery of the sensor network. Base station(s) collect the data from the sensor nodes and transmit this data to some remote control station. sensor network models considered by most researchers have a single static base station located on the periphery of the sensor network [2], [3], [4], [5]. Most sensors are equipped with non-rechargeable batteries that have limited lifetime [6]. Following development of technology, the upper bound of coverage becoming more and more important. In this work, we develop closed-form expressions of the upper bound of coverage in energy-efficient wireless sensor networks.
In this paper, an agent-based software architecture for automated wide area video surveillance systems is presented. the proposed concept is designed for detection and tracking of moving objects across multiple camera...
详细信息
A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant mon...
详细信息
ISBN:
(纸本)9781424425747
A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant monitoring. However ensuring the security of the deployed sensor network, which is part of the overall security of PCS, is of crucial importance. In this paper, we design a model-based intrusion detection system (IDS) for sensor networks used for PCS. Given that PCS tends to have regular traffic patterns and a well-defined request-response communication, we can design an IDS that models normal behavior of the entities and detects attacks when there is a deviation from this model. Model-based IDS can prove useful in detecting unknown attacks.
the proceedings contain 182 papers. the topics discussed include: voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks;secure message distribution scheme with configurable pr...
ISBN:
(纸本)9780769534923
the proceedings contain 182 papers. the topics discussed include: voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks;secure message distribution scheme with configurable privacy for heterogeneous wireless sensor networks;user-directed privacy protection in the ubiquitous environment;provably secure trusted access protocol for WLAN mesh networks;research of a multi-dimension measurement trusting model based on Markov chain;convertible undeniable partially blind signature from bilinear pairings;a novel approach to hardware architecture design and advanced optimization techniques for time critical applications;advanced optimization and design issues of a 32-bit embedded processor based on produced order queue computation model;a systematic framework for structured object-oriented security requirements analysis in embedded systems;and scheduling aperiodic tasks using total bandwidth server on multiprocessors.
the proceedings contain 182 papers. the topics discussed include: voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks;secure message distribution scheme with configurable pr...
ISBN:
(纸本)9780769534923
the proceedings contain 182 papers. the topics discussed include: voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks;secure message distribution scheme with configurable privacy for heterogeneous wireless sensor networks;user-directed privacy protection in the ubiquitous environment;provably secure trusted access protocol for WLAN mesh networks;research of a multi-dimension measurement trusting model based on Markov chain;convertible undeniable partially blind signature from bilinear pairings;a novel approach to hardware architecture design and advanced optimization techniques for time critical applications;advanced optimization and design issues of a 32-bit embedded processor based on produced order queue computation model;a systematic framework for structured object-oriented security requirements analysis in embedded systems;and scheduling aperiodic tasks using total bandwidth server on multiprocessors.
暂无评论