this paper proposes a novel hybrid cryptographic scheme for the generation of pair-wise network topology authenticated (TAK) keys in a Wireless sensor Network (WSN) using vector algebra in GF(q). the proposed scheme i...
详细信息
this paper proposes a novel hybrid cryptographic scheme for the generation of pair-wise network topology authenticated (TAK) keys in a Wireless sensor Network (WSN) using vector algebra in GF(q). the proposed scheme is deterministic, pair-wise keys are not pre-distributed but generated starting from partial key components, keys management exploits benefits from both symmetric and asymmetric schemes (hybrid cryptography) and each key in a pair node can be generated only if nodes have been authenticated (key authentication). Network topology authentication, and hybrid key cryptography are the building blocks for this proposal: the former means that a cryptographic key can be generated if and only if the current network topology is compliant to the ldquoplanned network topologyrdquo, which acts as the authenticated reference; the latter means that the proposed scheme is a combination of features from symmetric (for the ciphering and authentication model) and asymmetric cryptography (for the key generation model). the proposal fits the security requirement of a cryptographic scheme for WSN in a limited computing resource. A deep quantitative security analysis has been carried out. Moreover the cost analysis of the scheme in terms of computational time and memory usage for each node has been carried on and reported for the case of a 128-bit key.
Multi-sensorsystems are increasingly being deployed in many application scenarios due to the enormous potential they can offer. However, as the processing of sensory data often results in imprecise outcome, measuring...
详细信息
Multi-sensorsystems are increasingly being deployed in many application scenarios due to the enormous potential they can offer. However, as the processing of sensory data often results in imprecise outcome, measuring the quality of information (QoI) in these systems has become an important issue. the measurement of QoI is usually performed by processing the elementary data provided by the heterogeneous sensors, which is also influenced by the techniques involved in sensor management. However, the effect of context, such as environmental geometry, sensor placement, orientation, time, and other parameters in computing QoI has not yet been explored extensively in the literature. this paper proposes a context evolution model and studies its impact in the QoI computation. In particular, we show that the dynamic context information can be utilized to manage a multi-sensor system to improve its QoI.
this paper presents a behavior description algorithm from time-series data on daily life activities extracted using home sensors. In a previous work, we proposed a method of time-series data clustering based on Hidden...
详细信息
ISBN:
(纸本)9784907764319
this paper presents a behavior description algorithm from time-series data on daily life activities extracted using home sensors. In a previous work, we proposed a method of time-series data clustering based on Hidden Markov Models (HMMs). this method separates the time-series data in segments of equally short length, and applies a behavior label for each segment. However, the change points of behaviors are not clear and it is difficult to detect short length behavior. In this paper, we propose a new behavior description algorithm by introducing Singular Spectrum Transformation (SST), a nonlinear transformation used for change-point detection, and apply it to our previous method. this method enables more precise change-point detection and behavior labeling.
Nodes in a sensor network, operating on power limited batteries, must save power to minimize the need for battery replacement. In this paper, we study the power efficiency issues related to geographic broadcast protoc...
详细信息
Nodes in a sensor network, operating on power limited batteries, must save power to minimize the need for battery replacement. In this paper, we study the power efficiency issues related to geographic broadcast protocols in wireless sensor networks. Specifically, we study the problems in existing flooding based and pruning based broadcast algorithm and propose a new geographic power efficient broadcast algorithm to reduce the overlaps of broadcast coverage area and thus the total power consumption. the proposed algorithm is a hybrid protocol that combines broadcasts of maximum transmission radio range and forwards of much smaller transmission radio range. through simulation, we show that the GPEB protocol proposed in this paper can save total power consumption up to 23% compared to existing geographic broadcast protocols.
this paper describes initial research in addressing the challenges of managing quality of information for wireless sensor network target tracking with multiple missions of various priorities tracking multiple targets....
详细信息
this paper describes initial research in addressing the challenges of managing quality of information for wireless sensor network target tracking with multiple missions of various priorities tracking multiple targets. We address the use of a distributed market-based mechanism to equalize the information value loss (that itself is a function of quality of information (QoI)) of tracked targets across multiple tracking missions while managing network congestion arising as a result of tracking. this includes considering missionspsila priorities and starvation of missionspsila data updates. In support of this approach, we define QoI as a function of the precision of position prediction of a tracked target and the loss of information value as the product of QoI and the priority of the mission tracking the target.
Wireless sensor networks (WSN) can report large volumes of slowly varying routine data, while important or significant events can be relatively rare. An important challenge is then to offer the significant or unusual ...
详细信息
Wireless sensor networks (WSN) can report large volumes of slowly varying routine data, while important or significant events can be relatively rare. An important challenge is then to offer the significant or unusual data an adequate routing policy that will allow it to rapidly reach the sink nodes, despite the large volume of routine packets in the network. In this paper we introduce randomized re-routing (RRR), to detect the unusual events in a distributed manner, and dynamically transfer routine data packets to secondary paths in the network, while offering a fast track path with better QoS for the packets carrying unusual data. In this paper we describe the RRR algorithm and evaluate it with extensive simulations.
Connected dominating sets (CDSs) are probably the most common way of constructing virtual backbones for broadcasting operation in wireless sensor networks. this is because such backbones guarantee to reduce unnecessar...
详细信息
Connected dominating sets (CDSs) are probably the most common way of constructing virtual backbones for broadcasting operation in wireless sensor networks. this is because such backbones guarantee to reduce unnecessary message transmissions or flooding in the network. In this paper we propose a simple localized algorithm to construct a small-sized CDS. Considering the sensors deployed in the plane, our main idea is based on the computation of convex hulls of sensor nodes (nodes are considered points in the plane) in a localized manner and a simple coloring scheme, which produces a CDS in unit disk graphs whose size is at most 38*|MCDS| where |MCDS| is the size of a minimum CDS. To the best of our knowledge, this is a significant improvement over the best published results in the same context [5]. We also analyze grids and trees to compute the exact approximation ratios for the problem. We show that our algorithm produces an optimal CDS if the graph is a tree and in the case of grids the approximation factor is 2.
Random pairwise key pre-distribution schemes have been adopted extensively as a preferred approach to pairwise key agreement problem in distributedsensor networks. However, their practical applicability is threatened...
详细信息
Random pairwise key pre-distribution schemes have been adopted extensively as a preferred approach to pairwise key agreement problem in distributedsensor networks. However, their practical applicability is threatened by the key-swapping collusion attack whose goal is to ruin critical applications that require collaborative efforts. In this paper, we propose a light-weight framework for thwarting the attack. Our framework is a winning combination of intermittent deployment strategy and one-way hash chain. the framework thereby evades undesirable requirements of functionalities and resources, topological pre-deployment knowledge, or costly location-based detection algorithms, yet maintaining network scalability. Moreover, the in-depth analysis shows in the optimistic situation the framework not only completely defeats the attack but also diminishes usability of non-collusion compromised nodes to attackers. Meanwhile, it still maintains network resilience at a remarkable level in the worst situation. Finally, the performance overheads are analysed to be acceptable for use in the current sensor node generation.
Connectivity monitoring is useful in practical deployment of wireless sensor network. In order to understand the behavior and performance bottleneck, knowledge of the network connectivity is crucial. In this paper, we...
详细信息
Connectivity monitoring is useful in practical deployment of wireless sensor network. In order to understand the behavior and performance bottleneck, knowledge of the network connectivity is crucial. In this paper, we propose a flexible and efficient connectivity monitoring algorithm (H 2 CM) that has three components and operates in a divide and conquer manner. the components include hop vector distance based filtering, Bloom filters and signature hashing and are designed to work with different combinations of network and neighbor set sizes. In simulation, communication cost reduction of H 2 CM compare to maximal compression of neighborhood information varies from 65% to 85% for large networks (> 1000 nodes) and from 40% to 70% for a medium size network (a few hundred nodes). We have also implemented the algorithm in TinyOS and evaluated its performance on a testbed with 34 motes.
Most existing algorithms for fault-tolerant event region detection only assume that events are spatially correlated, but we argue that events are usually both spatially and temporally correlated. By examining the temp...
详细信息
Most existing algorithms for fault-tolerant event region detection only assume that events are spatially correlated, but we argue that events are usually both spatially and temporally correlated. By examining the temporal correlation of sensor measurements, we propose a detection algorithm by applying statistical hypothesis test (SHT). SHT-based algorithm is more accurate in detecting event regions, and is more energy efficient since it avoids measurement exchanges. To improve the capability of fault recognition, we extend SHT-based algorithm by examining both spatial and temporal correlations of sensor measurements. the extended SHT-based algorithm can recognize almost all faults when sensor network is densely deployed.
暂无评论