共查询到20条相似文献,搜索用时 10 毫秒
1.
Much of the existing work on wireless sensor networks (WSNs) has focused on addressing the power and computational resource constraints of WSNs by the design of specific routing, MAC, and cross-layer protocols. Recently, there have been heightened privacy concerns over the data collected by and transmitted through WSNs. The wireless transmission required by a WSN, and the self-organizing nature of its architecture, makes privacy protection for WSNs an especially challenging problem. This paper provides a state-of-the-art survey of privacy-preserving techniques for WSNs. In particular, we review two main categories of privacy-preserving techniques for protecting two types of private information, data-oriented and context-oriented privacy, respectively. We also discuss a number of important open challenges for future research. Our hope is that this paper sheds some light on a fruitful direction of future research for privacy preservation in WSNs. 相似文献
2.
Securing wireless sensor networks: a survey 总被引:6,自引:0,他引:6
The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network. WSNs have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios. In hostile scenarios, it is very important to protect WSNs from malicious attacks. Due to various resource limitations and the salient features of a wireless sensor network, the security design for such networks is significantly challenging. In this article, we present a comprehensive survey of WSN security issues that were investigated by researchers in recent years and that shed light on future directions for WSN security. 相似文献
3.
A survey of security issues in wireless sensor networks 总被引:7,自引:0,他引:7
《Communications Surveys & Tutorials, IEEE》2006,8(2):2-23
4.
Routing techniques in wireless sensor networks: a survey 总被引:32,自引:0,他引:32
Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. Routing protocols in WSNs might differ depending on the application and network architecture. In this article we present a survey of state-of-the-art routing techniques in WSNs. We first outline the design challenges for routing protocols in WSNs followed by a comprehensive survey of routing techniques. Overall, the routing techniques are classified into three categories based on the underlying network structure: flit, hierarchical, and location-based routing. Furthermore, these protocols can be classified into multipath-based, query-based, negotiation-based, QoS-based, and coherent-based depending on the protocol operation. We study the design trade-offs between energy and communication overhead savings in every routing paradigm. We also highlight the advantages and performance issues of each routing technique. The article concludes with possible future research areas. 相似文献
5.
A survey of transport protocols for wireless sensor networks 总被引:4,自引:0,他引:4
In this article we present a survey of transport protocols for wireless sensor networks (WSNs). We first highlight several unique aspects of WSNs, and describe the basic design criteria and challenges of transport protocols, including energy-efficiency, quality of service, reliability, and congestion control. We then provide a summary and comparison of existing transport protocols for WSNs. Finally, we discuss several open research problems. 相似文献
6.
7.
A survey on power control issues in wireless sensor networks 总被引:4,自引:0,他引:4
《Communications Surveys & Tutorials, IEEE》2007,9(4):86-107
8.
A survey on routing protocols for wireless sensor networks 总被引:33,自引:0,他引:33
Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Most of the attention, however, has been given to the routing protocols since they might differ depending on the application and network architecture. This paper surveys recent routing protocols for sensor networks and presents a classification for the various approaches pursued. The three main categories explored in this paper are data-centric, hierarchical and location-based. Each routing protocol is described and discussed under the appropriate category. Moreover, protocols using contemporary methodologies such as network flow and quality of service modeling are also discussed. The paper concludes with open research issues. 相似文献
9.
Clock synchronization for wireless sensor networks: a survey 总被引:10,自引:0,他引:10
Recent advances in micro-electromechanical (MEMS) technology have led to the development of small, low-cost, and low-power sensors. Wireless sensor networks (WSNs) are large-scale networks of such sensors, dedicated to observing and monitoring various aspects of the physical world. In such networks, data from each sensor is agglomerated using data fusion to form a single meaningful result, which makes time synchronization between sensors highly desirable. This paper surveys and evaluates existing clock synchronization protocols based on a palette of factors like precision, accuracy, cost, and complexity. The design considerations presented here can help developers either in choosing an existing synchronization protocol or in defining a new protocol that is best suited to the specific needs of a sensor-network application. Finally, the survey provides a valuable framework by which designers can compare new and existing synchronization protocols. 相似文献
10.
MAC protocols for wireless sensor networks: a survey 总被引:25,自引:0,他引:25
Wireless sensor networks are appealing to researchers due to their wide range of application potential in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. However, low sensing ranges result in dense networks and thus it becomes necessary to achieve an efficient medium-access protocol subject to power constraints. Various medium-access control (MAC) protocols with different objectives have been proposed for wireless sensor networks. In this article, we first outline the sensor network properties that are crucial for the design of MAC layer protocols. Then, we describe several MAC protocols proposed for sensor networks, emphasizing their strengths and weaknesses. Finally, we point out open research issues with regard to MAC layer design. 相似文献
11.
12.
Energy balanced data propagation in wireless sensor networks 总被引:1,自引:0,他引:1
We study the problem of energy-balanced data propagation in wireless sensor networks. The energy balance property guarantees that the average per sensor energy dissipation
is the same for all sensors in the network, during the entire execution of the data propagation protocol. This property is
important since it prolongs the network’:s lifetime by avoiding early energy depletion of sensors.
We propose a new algorithm that in each step decides whether to propagate data one-hop towards the final destination (the sink), or to send data directly
to the sink. This randomized choice balances the (cheap) one-hop transimssions with the direct transimissions to the sink,
which are more expensive but “bypass” the sensors lying close to the sink. Note that, in most protocols, these close to the sink sensors tend to be overused and die out early.
By a detailed analysis we precisely estimate the probabilities for each propagation choice in order to guarantee energy balance. The needed estimation can easily be performed
by current sensors using simple to obtain information. Under some assumptions, we also derive a closed form for these probabilities.
The fact (shown by our analysis) that direct (expensive) transmissions to the sink are needed only rarely, shows that our
protocol, besides energy-balanced, is also energy efficient.
This work has been partially supported by the IST/FET/GC Programme of the European Union under contract numbers IST-2001-33135
(CRESCCO) and 6FP 001907 (DELIS). A perliminary version of the work appeared in WMAN 2004 [11].
Charilaos Efthymiou graduated form the Computer Engineering and Informatics Department (CEID) of the University of Patras, Greece. He received
his MSc from the same department with advisor in S. Nikoletseas. He currently continuous his Ph.D studies in CEID with advisor
L. Kirousis. His research interest include Probabilistic Techniques and Random Graphs, Randomized Algorithms in Computationally
Hard Problems, Stochastic Processes and its Applications to Computer Science.
Dr. Sotiris Nikoletseas is currently a Senior Researcher and Managing Director of Research Unit 1 (“Foundations of Computer Science, Relevant Technologies
and Applications”) at the Computer Technology Institute (CTI), Patras, Greece and also a Lecturer at the Computer Engineering
and Informatics Department of Patras University, Greece. His research interests include Probabilistic Techniques and Random
Graphs, Average Case Analysis of Graph Algorithms and Randomized Algorithms, Fundamental Issues in Parallel and Distributed
Computing, Approximate Solutions to Computationally Hard Problems. He has published scientific articles in major international
conferences and journals and has co-authored (with Paul Spirakis) a book on Probabilistic Techniques. He has been invited
speaker in important international scientific events and Universities. He has been a referee for the Theoretical Computer
Science (TCS) Journal and important international conferences (ESA, ICALP). He has participated in many EU funded R&D projects
(ESPRIT/ALCOM-IT, ESPRIT/GEPPCOM). He currently participates in 6 Fifth Framework projects: ALCOM-FT, ASPIS, UNIVERSAL, EICSTES
(IST), ARACNE, AMORE (IMPROVING).
Jose Rolim is Full Professor at the Department
of Computer Science of the University of Geneva where he leads the Theoretical Computer Science and Sensor Lab (TCSensor Lab).
He received his Ph.D. degree in Computer Science at the University of California, Los Angeles working together with Prof.
S. Greibach. He has published several articles on the areas of distributed systems, randomization and computational complexity
and leads two major projects on the area of Power Aware Computing and Games and Complexity, financed by the Swiss National
Science Foundation. Prof. Rolim participates in the editorial board of several journals and conferences and he is the Steering
Committee Chair and General Chair of the IEEE Distributed Computing Conference in Sensor Systems. 相似文献
13.
在无线传感网( WSN)体系结构中,介质访问控制( MAC)协议负责调配网络中节点的信道接入,具有保障网络高效通信的重要作用。混合类MAC 协议综合了竞争类MAC 协议以及调度类MAC协议的特点,在融合两种机制的优点的同时克服其缺点,为无线信道资源的分配提供了更加灵活和全面的策略。首先概述了无线传感网MAC协议设计要点及分类,然后重点分析了无线传感网中经典的混合类MAC协议及国内外前沿的研究进展,并进一步归纳对比了各协议运行机制、性能及不足,得出混合类MAC协议的应用相关性及差异性的结论,最后总结了无线传感网混合类MAC协议研究现状并指出了未来的研究重点,以期为相关领域的研究人员提供参考。 相似文献
14.
Qureshi Bushra Aziz Sammah Abdel Wang Xingfu Hawbani Ammar Alsamhi Saeed Hamood Qureshi Taiyaba Naji Abdulbary 《Wireless Networks》2022,28(7):3019-3043
Wireless Networks - Wireless rechargeable sensor network (WRSN) is an emerging technology that has risen intending to enhance network lifetime of the conventional wireless sensor networks (WSNs).... 相似文献
15.
The major challenge in designing wireless sensor networks (WSNs) is the support of the functional, such as data latency, and the non-functional, such as data integrity, requirements while coping with the computation, energy and communication constraints. Careful node placement can be a very effective optimization means for achieving the desired design goals. In this paper, we report on the current state of the research on optimized node placement in WSNs. We highlight the issues, identify the various objectives and enumerate the different models and formulations. We categorize the placement strategies into static and dynamic depending on whether the optimization is performed at the time of deployment or while the network is operational, respectively. We further classify the published techniques based on the role that the node plays in the network and the primary performance objective considered. The paper also highlights open problems in this area of research. 相似文献
16.
In this article we provide a comprehensive review of the existing literature on techniques and protocols for in-network aggregation in wireless sensor networks. We first define suitable criteria to classify existing solutions, and then describe them by separately addressing the different layers of the protocol stack while highlighting the role of a cross-layer design approach, which is likely to be needed for optimal performance. Throughout the article we identify and discuss open issues, and propose directions for future research in the area 相似文献
17.
Wireless sensor networks (WSNs) have limited resources, thus extending the lifetime has always been an issue of great interest. Recent developments in WSNs have led to various new fuzzy systems, specifically designed for WSNs where energy awareness is an essential consideration. In several applications, the clustered WSN are known to perform better than flat WSN, if the energy consumption in clustering operation itself could be minimised. Routing in clustered WSN is very efficient, especially when the challenge of finding the optimum number of intermediate cluster heads can be resolved. Fortunately, several fuzzy logic based solutions have been proposed for these jobs. Both single- and two-level fuzzy logic approaches are being used for cluster head election in which several distinguished features of WSN have been considered in making a decision. This article surveys the recent fuzzy applications for cluster head selection in WSNs and presents a comparative study for the various approaches pursued. 相似文献
18.
Since wireless sensor networks are emerging as innovative technologies for realizing a variety of functions through a number of compact sensor nodes, security must be justified and ensured prior to their deployment. An adversary may compromise sensor nodes, forcing them to generate undesired data, and propagation of these data packets through the network results in wasteful energy consumption. We develop a security mechanism to detect energy-consuming useless packets, assuming that a sensor node is able to generate multiple message authentication codes (MAC) using preshared secrets. The forwarding nodes along the path verify the validity of the packet by checking the authenticity of the attached MACs. This mechanism performs well when a malicious node does not have all the cryptographic keys. However, packets, generated by the malicious node having all the keys, would be considered as legitimate, and thus, the forwarding nodes become unable to detect and discard them. To deal with this problem, we devise another mechanism in which each forwarding node is capable of checking such suspicious nodes. We have quantified the security strength through analysis and simulations to show that the proposed mechanisms make the entire network energy conserving. 相似文献
19.
20.
Xingfa Shen Cheng Bo Jianhui Zhang Shaojie Tang Xufei Mao Guojun Dai 《Ad hoc Networks》2013,11(4):1421-1431
The rapid advances in processor, memory, and radio technology enable the development of small, inexpensive sensor nodes that are capable of sensing, computation, and communication. However, the severe energy constraints of the sensors present major challenges for long-term applications. In order to achieve sustainability, environmental energy harvesting has been demonstrated as a promising approach. In this work, the energy utilization scheme is investigated for wireless sensor networks with energy harvesting nodes. The energy utilization system is divided to three parts: energy harvesting, energy consuming and energy storage. Then the sustainability problem is formulated as an energy flow control problem. An energy flow control system, called EFCon, is proposed to keep the balance between energy supplies and demands. EFCon consists of two phases, energy flow direction control and flow rate control. In the phase of energy flow direction control, the system dynamically switches among four patterns: flood flow, direct flow, compensate flow, and backup flow, according to current environmental energy condition and the residual energy condition. Once the energy flow direction is determined, a corresponding energy flow rate control strategy will be adopted for efficient energy utilization. The EFCon is implemented and validated by a long-term deployment in real testbeds. The experimental results indicate that the EFCon outperforms existing designs. 相似文献