共查询到20条相似文献,搜索用时 11 毫秒
1.
《Digital Communications & Networks》2016,2(1):1-14
The US Department of Defense (DoD) routinely uses wireless sensor networks (WSNs) for military tactical communications. Sensor node die-out has a significant impact on the topology of a tactical WSN. This is problematic for military applications where situational data is critical to tactical decision making. To increase the amount of time all sensor nodes remain active within the network and to control the network topology tactically, energy efficient routing mechanisms must be employed. In this paper, we aim to provide realistic insights on the practical advantages and disadvantages of using established routing techniques for tactical WSNs. We investigate the following established routing algorithms: direct routing, minimum transmission energy (MTE), Low Energy Adaptive Cluster Head routing (LEACH), and zone clustering. Based on the node die out statistics observed with these algorithms and the topological impact the node die outs have on the network, we develop a novel, energy efficient zone clustering algorithm called EZone. Via extensive simulations using MATLAB, we analyze the effectiveness of these algorithms on network performance for single and multiple gateway scenarios and show that the EZone algorithm tactically controls the topology of the network, thereby maintaining significant service area coverage when compared to the other routing algorithms. 相似文献
2.
Wireless sensor networks (WSN) are formed by network-enabled sensors spatially randomly distributed over an area. Because the number of nodes in the WSNs is usually large, channel reuse must be applied, keeping co-channel nodes sufficiently separated geographically to achieve
satisfactory SIR level. The most efficient channel reuse configuration for WSN has been determined and the worst-interference scenario has been identified. For this channel reuse pattern and worst-case
scenario, the minimum co-channel separation distance consistent with an SIR level constraint is derived. Our results show that the two-hop co-channel separations often assumed for sensor and ad hoc
networks are not sufficient to guarantee communications. Minimum co-channel separation curves given various parameters are
also presented. The results in this paper provide theoretical basis for channel spatial reuse and medium access control for
WSN s and also serve as a guideline for how channel assignment algorithms should allocate channels. Furthermore, because the
derived co-channel separation is a function of the sensor transmission radius, it also provides a connection between network
data transport capacity planning and network topology control which is administered by varying transmission powers.
Xiaofei Wang is born on July 31st, 1974, in Jilin, People’s Republic of China. He received the M.S. degree in Electrical Engineering from
Delft University of Technology, Delft, The Netherlands in 1992, and the Ph.D. degree in Electrical and Computer Engineering
from Cornell University, Ithaca, New York in 2005.
From 1997 to 1998, he was selected as one of the twenty best master graduate candidates in all fields to participate in the
Japan Prizewinners Programme, an international leadership exchange program established by the Dutch Ministry of Culture, Science
and Education. From 1998 to 1999, he worked as a researcher at the Department of Electrical Engineering and Applied Mathematics
of Delft University of Technology in the areas of Secondary Surveillance Radar and Ground Penetrating Radar.
His research interests include wireless sensor networks, wireless mesh networks, wireless networking, error control coding,
communication theory and information theory. He is currently working at Qualcomm Incorporated in San Diego, CA.
Toby Berger was born in New York, NY on September 4, 1940. He received the B.E. degree in electrical engineering from Yale University,
New Haven, CT in 1962, and the M.S. and Ph.D. degrees in applied mathematics from Harvard University, Cambridge, MA in 1964
and 1966, respectively.
From 1962 to 1968 he was a Senior Scientist at Raytheon Company, Wayland, MA. From 1968 through 2005 he he held the position
of Irwin and Joan Jacobs Professor of Engineering at Cornell University, Ithaca, NY where in 2006 he became a professor in
the ECE Deportment of the University of Virginia, Charlottesville, VA.
Professor Berger’s research interests include information theory, random fields, communication networks, wireless communications,
video compression, voice and signature compression and verification, neuroinformation theory, quantum information theory,
and coherent signal processing.
Berger has served as editor-in-chief of the IEEE Transactions on Information Theory and as president of the IEEE Information
Theory Group. He has been a Fellow of the Guggenheim Foundation, the Japan Society for Promotion of Science, the Ministry
of Education of the People’s Republic of China and the Fulbright Foundation. In 1982 he received the Frederick E. Terman Award
of the American Society for Engineering Education, he received the 2002 Shannon Award from the IEEE Information Theory Society
and has been designated the recipient of the IEEE 2006 Leon K. Kirchmayer Graduate Teaching Award. Berger is a Fellow and
Life Member of the IEEE, a life member of Tau Beta Pi, and an avid blues harmonica player. 相似文献
3.
The major challenge in designing wireless sensor networks (WSNs) is the support of the functional, such as data latency, and the non-functional, such as data integrity, requirements while coping with the computation, energy and communication constraints. Careful node placement can be a very effective optimization means for achieving the desired design goals. In this paper, we report on the current state of the research on optimized node placement in WSNs. We highlight the issues, identify the various objectives and enumerate the different models and formulations. We categorize the placement strategies into static and dynamic depending on whether the optimization is performed at the time of deployment or while the network is operational, respectively. We further classify the published techniques based on the role that the node plays in the network and the primary performance objective considered. The paper also highlights open problems in this area of research. 相似文献
4.
Stefano Basagni Alessio Carosi Emanuel Melachrinoudis Chiara Petrioli Z. Maria Wang 《Wireless Networks》2008,14(6):831-858
This paper demonstrates the advantages of using controlled mobility in wireless sensor networks (WSNs) for increasing their
lifetime, i.e., the period of time the network is able to provide its intended functionalities. More specifically, for WSNs
that comprise a large number of statically placed sensor nodes transmitting data to a collection point (the sink), we show
that by controlling the sink movements we can obtain remarkable lifetime improvements. In order to determine sink movements,
we first define a Mixed Integer Linear Programming (MILP) analytical model whose solution determines those sink routes that
maximize network lifetime. Our contribution expands further by defining the first heuristics for controlled sink movements
that are fully distributed and localized. Our Greedy Maximum Residual Energy (GMRE) heuristic moves the sink from its current location to a new site as if drawn toward the area where nodes have the
highest residual energy. We also introduce a simple distributed mobility scheme (Random Movement or RM) according to which the sink moves uncontrolled and randomly throughout the network. The different mobility schemes
are compared through extensive ns2-based simulations in networks with different nodes deployment, data routing protocols,
and constraints on the sink movements. In all considered scenarios, we observe that moving the sink always increases network
lifetime. In particular, our experiments show that controlling the mobility of the sink leads to remarkable improvements,
which are as high as sixfold compared to having the sink statically (and optimally) placed, and as high as twofold compared
to uncontrolled mobility.
Stefano Basagni holds a Ph.D. in electrical engineering from the University of Texas at Dallas (December 2001) and a Ph.D. in computer science
from the University of Milano, Italy (May 1998). He received his B.Sc. degree in computer science from the University of Pisa,
Italy, in 1991. Since Winter 2002 he is on faculty at the Department of Electrical and Computer Engineering at Northeastern
University, in Boston, MA. From August 2000 to January 2002 he was professor of computer science at the Department of Computer
Science of the Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas.
Dr. Basagni’s current research interests concern research and implementation aspects of mobile networks and wireless communications
systems, Bluetooth and sensor networking, definition and performance evaluation of network protocols and theoretical and practical
aspects of distributed algorithms.
Dr. Basagni has published over four dozens of referred technical papers and book chapters. He is also co-editor of two books.
Dr. Basagni served as a guest editor of the special issue of the Journal on Special Topics in Mobile Networking and Applications
(MONET) on Multipoint Communication in Wireless Mobile Networks, of the special issue on mobile ad hoc networks of the Wiley’s
Interscience’s Wireless Communications & Mobile Networks journal, and of the Elsevier’s journal Algorithmica on algorithmic
aspects of mobile computing and communications.
Dr. Basagni serves as a member of the editorial board and of the technical program committee of ACM and IEEE journals and
international conferences. He is a senior member of the ACM (including the ACM SIGMOBILE), senior member of the IEEE (Computer
and Communication societies), and member of ASEE (American Society for Engineering Education).
Alessio Carosi received the M.S. degree “summa cum laude” in Computer Science in 2004 from Rome University “La Sapienza.” He is currently
a Ph.D. candidate in Computer Science at Rome University “La Sapienza.” His research interests include protocols for ad hoc
and sensor networks, underwater systems and delay tolerant networking.
Emanuel Melachrinoudis received the Ph.D. degree in industrial engineering and operations research from the University of Massachusetts, Amherst,
MA. He is currently the Director of Industrial Engineering and Associate Chairman of the Department of Mechanical and Industrial
Engineering at Northeastern University, Boston, MA. His research interests are in the areas of network optimization and multiple
criteria optimization with applications to telecommunication networks, distribution networks, location and routing. He is
a member of the Editorial Board of the International Journal of Operational Research. He has published in journals such as
Management Science, Transportation Science, Networks, European Journal of Operational Research, Naval Research Logistics and
IIE Transactions.
Chiara Petrioli received the Laurea degree “summa cum laude” in computer science in 1993, and the Ph.D. degree in computer engineering in
1998, both from Rome University “La Sapienza,” Italy. She is currently Associate Professor with the Computer Science Department
at Rome University “La Sapienza.” Her current work focuses on ad hoc and sensor networks, Delay Tolerant Networks, Personal
Area Networks, Energy-conserving protocols, QoS in IP networks and Content Delivery Networks where she contributed around
sixty papers published in prominent international journals and conferences. Prior to Rome University she was research associate
at Politecnico di Milano and was working with the Italian Space agency (ASI) and Alenia Spazio. Dr. Petrioli was guest editor
of the special issue on “Energy-conserving protocols in wireless Networks” of the ACM/Kluwer Journal on Special Topics in
Mobile Networking and Applications (ACM MONET) and is associate editor of IEEE Transactions on Vehicular Technology, the ACM/Kluwer
Wireless Networks journal, the Wiley InterScience Wireless Communications & Mobile Computing journal and the Elsevier Ad Hoc
Networks journal. She has served in the organizing committee and technical program committee of several leading conferences
in the area of networking and mobile computing including ACM Mobicom, ACM Mobihoc, IEEE ICC,IEEE Globecom. She is member of
the steering committee of ACM Sensys and of the international conference on Mobile and Ubiquitous Systems: Networking and
Services (Mobiquitous) and serves as member of the ACM SIGMOBILE executive committee. Dr. Petrioli was a Fulbright scholar.
She is a senior member of IEEE and a member of ACM.
Z. Maria Wang received her Bachelor degree in Electrical Engineering with the highest honor from Beijing Institute of Light Industry in
China, her M.S. degree in Industrial Engineering/Operations Research from Dalhousie University, Canada and her Ph.D. in Industrial
Engineering/Operations Research from Northeastern University, Boston. She served as a R&D Analyst for General Dynamics. Currently
MS. Wang serves as an Optimization Analyst with Nomis Solutions, Inc. 相似文献
5.
In wireless sensor networks, efficiently disseminating data from a dynamic source to multiple mobile sinks is important for
the applications such as mobile target detection and tracking. The tree-based multicasting scheme can be used. However, because
of the short communication range of each sensor node and the frequent movement of sources and sinks, a sink may fail to receive
data due to broken paths, and the tree should be frequently reconfigured to reconnect sources and sinks. To address the problem,
we propose a dynamic proxy tree-based framework in this paper. A big challenge in implementing the framework is how to efficiently reconfigure the proxy tree as sources and sinks change. We model the problem as on-line constructing a minimum Steiner tree in an Euclidean plane, and
propose centralized schemes to solve it. Considering the strict energy constraints in wireless sensor networks, we further
propose two distributed on-line schemes, the shortest path-based (SP) scheme and the spanning range-based (SR) scheme. Extensive simulations are conducted to evaluate the schemes. The results show that the distributed schemes have similar
performance as the centralized ones, and among the distributed schemes, the SR scheme outperforms the SP scheme. 相似文献
6.
Majid Baghaei Nejad Meigen Shen Tero Koivisto Teemu Peltonen Esa Tjukanoff Hannu Tenhunen Li-Rong Zheng 《Analog Integrated Circuits and Signal Processing》2007,50(1):47-57
In this paper, we describe an impulse-based ultra wideband (UWB) radio system for wireless sensor network (WSN) applications. Different architectures have been studied for base station and sensor nodes. The base station node uses coherent UWB architecture because of the high performance and good sensitivity requirements. However, to meet complexity, power and cost constraints, the sensor module uses a novel non-coherent architecture that can autonomously detect the UWB signals. The radio modules include a transceiver block, a baseband processing unit and a power management block. The transceiver block includes a Gaussian pulse generator, a multiplier, an integrator and timing circuits. For long range applications, a wideband low noise amplifier (LNA) is included in the transceiver of the sensor module, whereas in short range applications it is simply eliminated to further reduce the power consumption. In order to verify the proposed system concept, circuit level implementation is studied using 1.5 V 0.18 μm CMOS technology. Finally, the UWB radio modules have been designed for implementation in liquid-crystal-polymer (LCP) based System-on-Package (SoP) technology for low power, low cost and small size integration. A small low cost, double-slotted, Knight’s helm antenna is embedded in the LCP substrate, which shows stable characterization and a return loss better than ?10 dB over the UWB band. 相似文献
7.
Energy balanced data propagation in wireless sensor networks 总被引:1,自引:0,他引:1
We study the problem of energy-balanced data propagation in wireless sensor networks. The energy balance property guarantees that the average per sensor energy dissipation
is the same for all sensors in the network, during the entire execution of the data propagation protocol. This property is
important since it prolongs the network’:s lifetime by avoiding early energy depletion of sensors.
We propose a new algorithm that in each step decides whether to propagate data one-hop towards the final destination (the sink), or to send data directly
to the sink. This randomized choice balances the (cheap) one-hop transimssions with the direct transimissions to the sink,
which are more expensive but “bypass” the sensors lying close to the sink. Note that, in most protocols, these close to the sink sensors tend to be overused and die out early.
By a detailed analysis we precisely estimate the probabilities for each propagation choice in order to guarantee energy balance. The needed estimation can easily be performed
by current sensors using simple to obtain information. Under some assumptions, we also derive a closed form for these probabilities.
The fact (shown by our analysis) that direct (expensive) transmissions to the sink are needed only rarely, shows that our
protocol, besides energy-balanced, is also energy efficient.
This work has been partially supported by the IST/FET/GC Programme of the European Union under contract numbers IST-2001-33135
(CRESCCO) and 6FP 001907 (DELIS). A perliminary version of the work appeared in WMAN 2004 [11].
Charilaos Efthymiou graduated form the Computer Engineering and Informatics Department (CEID) of the University of Patras, Greece. He received
his MSc from the same department with advisor in S. Nikoletseas. He currently continuous his Ph.D studies in CEID with advisor
L. Kirousis. His research interest include Probabilistic Techniques and Random Graphs, Randomized Algorithms in Computationally
Hard Problems, Stochastic Processes and its Applications to Computer Science.
Dr. Sotiris Nikoletseas is currently a Senior Researcher and Managing Director of Research Unit 1 (“Foundations of Computer Science, Relevant Technologies
and Applications”) at the Computer Technology Institute (CTI), Patras, Greece and also a Lecturer at the Computer Engineering
and Informatics Department of Patras University, Greece. His research interests include Probabilistic Techniques and Random
Graphs, Average Case Analysis of Graph Algorithms and Randomized Algorithms, Fundamental Issues in Parallel and Distributed
Computing, Approximate Solutions to Computationally Hard Problems. He has published scientific articles in major international
conferences and journals and has co-authored (with Paul Spirakis) a book on Probabilistic Techniques. He has been invited
speaker in important international scientific events and Universities. He has been a referee for the Theoretical Computer
Science (TCS) Journal and important international conferences (ESA, ICALP). He has participated in many EU funded R&D projects
(ESPRIT/ALCOM-IT, ESPRIT/GEPPCOM). He currently participates in 6 Fifth Framework projects: ALCOM-FT, ASPIS, UNIVERSAL, EICSTES
(IST), ARACNE, AMORE (IMPROVING).
Jose Rolim is Full Professor at the Department
of Computer Science of the University of Geneva where he leads the Theoretical Computer Science and Sensor Lab (TCSensor Lab).
He received his Ph.D. degree in Computer Science at the University of California, Los Angeles working together with Prof.
S. Greibach. He has published several articles on the areas of distributed systems, randomization and computational complexity
and leads two major projects on the area of Power Aware Computing and Games and Complexity, financed by the Swiss National
Science Foundation. Prof. Rolim participates in the editorial board of several journals and conferences and he is the Steering
Committee Chair and General Chair of the IEEE Distributed Computing Conference in Sensor Systems. 相似文献
8.
In this paper we focus on the problems of high latency and low throughput arising from the periodic operation of MAC protocols for wireless sensor networks. In order to meet both design criteria we propose an energy-efficient, low delay, fast-periodic MAC algorithm, namely FP-MAC, that is exclusively designed for 802.15.4-like networks utilizing in full the standard’s physical layer. Our proposal relies on the short periodic communication operation of the nodes comprising the WSN. This is achieved by decreasing the actions that a node needs to perform at the start of every communication period and by incorporating a variable radio-on operation. Moreover, the algorithm introduces differences in nodes’ scheduling to further reduce delay. Local synchronization and the crucial task of determining the proper timing for transmission and reception of data is achieved through the periodic broadcast of special synchronization frames at the beginning of each on-period. FP-MAC is evaluated and compared to S-MAC and T-MAC through extensive simulations, showing a significant improvement in terms of low energy consumption and average MAC delay. 相似文献
9.
In-network data aggregation is an essential operation to reduce energy consumption in large-scale wireless sensor networks. With data aggregation, however, raw data items are invisible to the base station and thus the authenticity of the aggregated data is hard to guarantee. A compromised sensor node may forge an aggregation value and mislead the base station into trusting a false reading. Due to the stringent constraints of energy supply and computing capability on sensor nodes, it is challenging to detect a compromised sensor node and keep it from cheating, since expensive cryptographic operations are unsuitable for tiny sensor devices. This paper proposes a secure aggregation tree (SAT) to detect and prevent cheating. Our method is essentially different from other existing solutions in that it does not require any cryptographic operations when all sensor nodes work honestly. The detection of cheating is based on the topological constraints in the aggregation tree. We also propose a weighted voting scheme to determine a misbehaving node and a secure local recovery scheme to avoid using the misbehaving node. 相似文献
10.
《AEUE-International Journal of Electronics and Communications》2014,68(7):578-580
Indoor localization systems are becoming very popular because they enable the creation of very interesting location-based applications. This paper provides a short introduction about localization systems based on a sensor network and the actual state of the art. Important topics related to indoor localization like the necessary infrastructure, available technologies and their expected accuracy are treated. Additionally, the results of previous work referred to the performance evaluation of localization algorithms are shortly described. Finally, some ideas related to further investigations are presented. 相似文献
11.
Wireless sensor networks are expected to be used in a wide range of applications from environment monitoring to event detection. The key challenge is to provide energy efficient communication; however, latency remains an important concern for many applications that require fast response. In this paper, we address the important problem of minimizing average communication latency for the active flows while providing energy-efficiency in wireless sensor networks. As the flows in some wireless sensor network can be long-lived and predictable, it is possible to design schedules for sensor nodes so that nodes can wake up only when it is necessary and asleep during other times. Clearly, the routing layer decision is closely coupled to the wakeup/sleep schedule of the sensor nodes. We formulate a joint scheduling and routing problem with the objective of finding the schedules and routes for current active flows with minimum average latency. By constructing a novel delay graph, the problem can be solved optimally by employing the M node-disjoint paths algorithm under FDMA channel model. We further present extensions of the algorithm to handle dynamic traffic changes and topology changes in wireless sensor networks. 相似文献
12.
In wireless sensor networks (WSNs), broadcast authentication is a crucial security mechanism that allows a multitude of legitimate users to join in and disseminate messages into the networks in a dynamic and authenticated way. During the past few years, several public-key based multi-user broadcast authentication schemes have been proposed to achieve immediate authentication and to address the security vulnerability intrinsic to μTESLA-like schemes. Unfortunately, the relatively slow signature verification in signature-based broadcast authentication has also incurred a series of problems such as high energy consumption and long verification delay. In this contribution, we propose an efficient technique to accelerate the signature verification in WSNs through the cooperation among sensor nodes. By allowing some sensor nodes to release the intermediate computation results to their neighbors during the signature verification, a large number of sensor nodes can accelerate their signature verification process significantly. When applying our faster signature verification technique to the broadcast authentication in a 4 × 4 grid-based WSN, a quantitative performance analysis shows that our scheme needs 17.7-34.5% less energy and runs about 50% faster than the traditional signature verification method. The efficiency of the proposed technique has been tested through an experimental study on a network of MICAz motes. 相似文献
13.
A precise localization for mobile target in wireless sensor networks is presented in this letter,where a geometrical relationship is explored to improve the location estimation for mobile target,instead of a simple centroid approach.The equations of location compensation algorithm for mobile target are derived based on linear trajectory prediction and sensor selective activation.The results based on extensive simulation experiments show that the compensation algorithm gets better performance in metrics of quality of tracking and energy efficiency with the change of sensor sensing range,the ratio of sensing range and sensor activation range,and the data sampling rate than traditional methods,which means our proposing can achieve better quality-energy tradeoff for mobile target in wireless sensor networks. 相似文献
14.
Self-propagating mal-packets have become an emergent threat against information confidentiality, integrity, and service availability in wireless sensor networks. While playing an important role for people to interact with surrounding environment, wireless sensor networks suffer from growing security concerns posed by mal-packets because of sensor networks’ low physical security, lack of resilience and robustness of underlying operating systems, and the ever-increasing complexity of deployed applications.In this paper, we study the propagation of mal-packets in 802.15.4 based wireless sensor networks. Based on our proposed mal-packet self-propagation models, we use TOSSIM, a simulator for wireless sensor networks, to study their propagation dynamics. We also present a study of the feasibility of mal-packet defense in sensor networks. Specifically, we apply random graph theory and percolation theory to investigate the immunization of highly-connected nodes, i.e., nodes with high degrees of connectivity. Our goal is to partition the network into as many separate pieces as possible, thus preventing or slowing down the mal-packet propagation. We study the percolation thresholds of different network densities and the effectiveness of immunization in terms of connection ratio, remaining link ratio, and distribution of component sizes. We also present an analysis of the distribution of component sizes. 相似文献
15.
In wireless sensor networks, one of the main design challenges is to save severely constrained energy resources and obtain long system lifetime. Low cost of sensors enables us to randomly deploy a large number of sensor nodes. Thus, a potential approach to solve lifetime problem arises. That is to let sensors work alternatively by identifying redundant nodes in high-density networks and assigning them an off-duty operation mode that has lower energy consumption than the normal on-duty mode. In a single wireless sensor network, sensors are performing two operations: sensing and communication. Therefore, there might exist two kinds of redundancy in the network. Most of the previous work addressed only one kind of redundancy: sensing or communication alone. Wang et al. [Intergrated Coverage and Connectivity Configuration in Wireless Sensor Networks, in: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003), Los Angeles, November 2003] and Zhang and Hou [Maintaining Sensing Coverage and Connectivity in Large Sensor Networks. Technical report UIUCDCS-R-2003-2351, June 2003] first discussed how to combine consideration of coverage and connectivity maintenance in a single activity scheduling. They provided a sufficient condition for safe scheduling integration in those fully covered networks. However, random node deployment often makes initial sensing holes inside the deployed area inevitable even in an extremely high-density network. Therefore, in this paper, we enhance their work to support general wireless sensor networks by proving another conclusion: “the communication range is twice of the sensing range” is the sufficient condition and the tight lower bound to ensure that complete coverage preservation implies connectivity among active nodes if the original network topology (consisting of all the deployed nodes) is connected. Also, we extend the result to k-degree network connectivity and k-degree coverage preservation. 相似文献
16.
Secure probabilistic location verification in randomly deployed wireless sensor networks 总被引:2,自引:0,他引:2
Security plays an important role in the ability to deploy and retrieve trustworthy data from a wireless sensor network. Location verification is an effective defense against attacks which take advantage of a lack, or compromise, of location information. In this work, a secure probabilistic location verification method for randomly deployed dense sensor networks is proposed. The proposed Probabilistic Location Verification (PLV) algorithm leverages the probabilistic dependence of the number of hops a broadcast packet traverses to reach a destination and the Euclidean distance between the source and the destination. A small number of verifier nodes are used to determine the plausibility of the claimed location, which is represented by a real number between zero and one. Using the calculated plausibility metric, it is possible to create arbitrary number of trust levels in the location claimed. Simulation studies verify that the proposed solution provides high performance in face of various types of attacks. 相似文献
17.
Venkata C. Giruka Mukesh Singhal James Royalty Srilekha Varanasi 《Wireless Communications and Mobile Computing》2008,8(1):1-24
With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make‐up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad‐hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
18.
19.
Access control is one of the major security concerns for wireless sensor networks. However, applying conventional access control models that rely on the central Certificate Authority and sophisticated cryptographic algorithms to wireless sensor networks poses new challenges as wireless sensor networks are highly distributed and resource-constrained. In this paper, a distributed and fine-grained access control model based on the trust and centrality degree is proposed (TC-BAC). Our design uses the combination of trust and risk to grant access control. To meet the security requirements of an access control system with the absence of Certificate Authority, a distributed trust mechanism is developed to allow access of a trusted node to a network. Then, centrality degree is used to assess the risk factor of a node and award the access, which can reduce the risk ratio of the access control scheme and provide a certain protection level. Finally, our design also takes multi-domain access control into account and solves this problem by utilizing a mapping mechanism and group access policies. We show with simulation that TC-BAC can achieve both the intended level of security and high efficiency suitable for wireless sensor networks. 相似文献
20.
Wireless sensor and actor networks (WSANs) have been increasingly popular for environmental monitoring applications in the last decade. While the deployment of sensor nodes enables a fine granularity of data collection, resource-rich actor nodes provide further evaluation of the information and reaction. Quality of service (QoS) and routing solutions for WSANs are challenging compared to traditional networks because of the limited node resources. WSANs also have different QoS requirements than wireless sensor networks (WSNs) since actors and sensor nodes have distinct resource constraints.In this paper, we present, LRP-QS, a lightweight routing protocol with dynamic interests and QoS support for WSANs. LRP-QS provides QoS by differentiating the rates among different types of interests with dynamic packet tagging at sensor nodes and per flow management at actor nodes. The interests, which define the types of events to observe, are distributed in the network. The weights of the interests are determined dynamically by using a nonsensitive ranking algorithm depending on the variation in the observed values of data collected in response to interests. Our simulation studies show that the proposed protocol provides a higher packet delivery ratio and a lower memory consumption than the existing state of the art protocols. 相似文献