首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Sensor networks are a promising computing paradigm for monitoring the physical environment and providing observations for various uses. In hostile situations, it is critical to enforce network access control to ensure the integrity, availability, and at times confidentiality of the sensor data. A natural idea is to adopt a centralized design where every access request from users goes through a trusted base station. However, this idea is not practical due to the cost and efficiency issues. This paper proposes two efficient and distributed access control methods, uni-access query and multi-access query. The uni-access query uses only symmetric cryptographic operations; it allows (1) a user to directly access the data on any sensor node in the network without going through the base station and (2) a sensor to protect its data so that only authorized users can access. Compared to existing solutions, this scheme is much more flexible and efficient. In addition, this scheme can also support privilege delegation, which allows a user to delegate all or part of its privilege to others without using the base station. The multi-access query applies public key cryptography to provide an additional feature, which allows a user to access the data on many sensor nodes via a single query. Compared to existing solutions that require a user to send at least one request for every sensor node to be queried, the multi-access query reduces the communication overhead significantly. The theoretical analysis and simulation evaluation show that the proposed schemes are practical for access control in sensor networks.  相似文献   

2.
Achieving distributed user access control in sensor networks   总被引:1,自引:0,他引:1  
User access control in sensor networks defines a process of granting user an access right to the stored information. It is essential for future real sensor network deployment in which sensors may provide users with different services in terms of data and resource accesses. A centralized access control mechanism requires the base station to be involved whenever a user requests to get authenticated and access the information stored in the sensor node, which is inefficient, not scalable, and is exposed to many potential attacks along long communication paths. In this paper, we propose a distributed user access control under a realistic adversary model in which sensors can be compromised and user may collude. We split the access control into local authentication conducted by a group of sensors physically close to a user, and a light remote authentication based on the endorsement of the local sensors. We implement the access control protocols on a testbed of TelosB motes. Our analysis and experimental results show that our schemes are feasible for real access control requirements.  相似文献   

3.
Wireless sensor networks (WSNs), has been under development for a while by the academia and industry. Due to limited computational power, a typical sensor node may experience operational challenges. Moreover, mobility has become an important feature since emergency and healthcare related applications are evolving in WSNs. Consideration of mobile nodes in WSNs introduce new challenges for the designers. In this paper, an enhanced version of T-MAC protocol (a well-known medium access control protocol in WSNs) known as MT-MAC is proposed. Using the capturing fluctuation in RSSI and LQI values of the received SYNC packets, MT-MAC solves high packet drop ratio in T-MAC. By detecting the mobility, a mobile node softly handover to a new virtual cluster without losing connection with other nodes. The performance of the proposed solution is then compared with T-MAC, S-MAC as well as other well-known mobility-aware MAC (MS-MAC) protocol. The simulation results show that the proposed protocol significantly increases the throughput and packet delivery ratio of T-MAC in exchange for a small increase in power consumption. Compared to MS-MAC protocol, the proposed approach can reduce power consumption by 20–65%, and achieve slightly higher packet delivery ratio.  相似文献   

4.
In wireless sensor networks (WSNs), a lot of sensory traffic with redundancy is produced due to massive node density and their diverse placement. This causes the decline of scarce network resources such as bandwidth and energy, thus decreasing the lifetime of sensor network. Recently, the mobile agent (MA) paradigm has been proposed as a solution to overcome these problems. The MA approach accounts for performing data processing and making data aggregation decisions at nodes rather than bring data back to a central processor (sink). Using this approach, redundant sensory data is eliminated. In this article, we consider the problem of calculating near-optimal routes for MAs that incrementally fuse the data as they visit the nodes in a WSN. The order of visited nodes (the agent’s itinerary) affects not only the quality but also the overall cost of data fusion. Our proposed heuristic algorithm adapts methods usually applied in network design problems in the specific requirements of sensor networks. It computes an approximate solution to the problem by suggesting an appropriate number of MAs that minimizes the overall data fusion cost and constructs near-optimal itineraries for each of them. The performance gain of our algorithm over alternative approaches both in terms of cost and task completion latency is demonstrated by a quantitative evaluation and also in simulated environments through a Java-based tool.  相似文献   

5.
Recent developments in sensor technology, as seen in Berkeley’s Mica2 Mote, Rockwell’s WINS nodes and the IEEE 802.15.4 Zigbee, have enabled support for single-transceiver, multi-channel communication. The task of channel assignment with minimum interference, also named as the 2-hop coloring problem, allows repetition of colors occurs only if the nodes are separated by more than 2 hops. Being NP complete, development of efficient heuristics for this coloring problem is an open research area and this paper proposes the Dynamic Channel Allocation (DCA) algorithm as a novel solution. Once channels are assigned, a Medium Access Control protocol must be devised so that channel selection, arbitration and scheduling occur with maximum energy savings and reduced message overhead, both critical considerations for sensor networks. The contribution of this paper is twofold: (1) development and analysis of the DCA algorithm that assigns optimally minimum channels in a distributed manner in order to make subsequent communication free from both primary and secondary interference and (2) proposing CMAC, a fully desynchronized multi-channel MAC protocol with minimum hardware requirements. CMAC takes into account the fundamental energy constraint in sensor nodes by placing them in a default sleep mode as far as possible, enables spatial channel re-use and ensures nearly collision free communication. Simulation results reveal that the DCA consumes significantly less energy while giving a legal distributed coloring. CMAC, our MAC protocol that leverages this coloring, has been thoroughly evaluated with various modes in SMAC, a recent protocol that achieves energy savings through coordinated sleeping. Results show that CMAC obtains nearly 200% reduction in energy consumption, significantly improved throughput, and end-to-end delay values that are 50–150% better than SMAC for our simulated topologies.  相似文献   

6.
This paper proposes S-MAC, a medium access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining largely inactive for long time, but becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from traditional wireless MACs such as IEEE 802.11 in several ways: energy conservation and self-configuration are primary goals, while per-node fairness and latency are less important. S-MAC uses a few novel techniques to reduce energy consumption and support self-configuration. It enables low-duty-cycle operation in a multihop network. Nodes form virtual clusters based on common sleep schedules to reduce control overhead and enable traffic-adaptive wake-up. S-MAC uses in-channel signaling to avoid overhearing unnecessary traffic. Finally, S-MAC applies message passing to reduce contention latency for applications that require in-network data processing. The paper presents measurement results of S-MAC performance on a sample sensor node, the UC Berkeley Mote, and reveals fundamental tradeoffs on energy, latency and throughput. Results show that S-MAC obtains significant energy savings compared with an 802.11-like MAC without sleeping.  相似文献   

7.
Wireless sensor networks (Wsns) tend to be highly optimized due to severely restricted constraints. Various medium access control (Mac) protocols forWsns have been proposed, being specially tailored to a target application. This paper proposes a taxonomy for the different mechanisms employed in those protocols. The taxonomy characterizes the protocols according to the methods implemented to handle energy consumption, quality of service and adaptability requirements. We also present an overview of the transceptors found inWsns, identifying how events on communication affect the energy consumption. Based on the taxonomy, we classify existingMac protocols. Finally, we discuss challenging trends inMac protocols forWsns, such as security issues and software radios.  相似文献   

8.
This paper presents ProFlex, a distributed data storage protocol for large-scale Heterogeneous Wireless Sensor Networks (HWSNs) with mobile sinks. ProFlex guarantees robustness in data collection by intelligently managing data replication among selected storage nodes in the network. Contrarily to related protocols in the literature, ProFlex considers the resource constraints of sensor nodes and constructs multiple data replication structures, which are managed by more powerful nodes. Additionally, ProFlex takes advantage of the higher communication range of such powerful nodes and uses the long-range links to improve data distribution by storage nodes. When compared with related protocols, we show through simulation that Proflex has an acceptable performance under message loss scenarios, decreases the overhead of transmitted messages, and decreases the occurrence of the energy hole problem. Moreover, we propose an improvement that allows the protocol to leverage the inherent data correlation and redundancy of wireless sensor networks in order to decrease even further the protocol’s overhead without affecting the quality of the data distribution by storage nodes.  相似文献   

9.
The problem of medium access control in wireless sensor networks   总被引:5,自引:0,他引:5  
In this article we revisit the problem of scheduled access through a detailed foray into the questions of energy consumption and throughput for MAC protocols in wireless sensor networks. We consider a static network model that rules out simultaneous transmission and reception by any sensor node and consequently requires partitioning of nodes into disjoint sets of transmitters and receivers at any time instant. Under the assumption of circular transmission (reception) ranges with sharp boundaries, a greedy receiver activation heuristic is developed relying on the network connectivity map to determine distinct receiver groups to be activated within disjoint time intervals. To conserve limited energy resources in sensor networks, the time allocation to each receiver group is based on the residual battery energy available at the respective transmitters. Upon activating each receiver group separately, the additional time-division mechanism of group TDMA is imposed to schedule transmissions interfering at the non-intended destinations within separate fractions of time in order to preserve the reliable feedback information. The two-layered time-division structure of receiver activation and group TDMA algorithms offers distributed and polynomial-time solutions (as required by autonomous sensor networks) to the problems of link scheduling as well as energy and throughput-efficient resource allocation in wireless access. The associated synchronization and overhead issues are not considered in this article.  相似文献   

10.
Wireless Sensor Networks (WSN) are mainly characterized by dense deployment of sensor nodes which collectively transmit information about sensed events to the sink. Due to the spatial correlation between sensor nodes subject to observed events, it may not be necessary for every sensor node to transmit its data. This paper shows how the spatial correlation can be exploited on the Medium Access Control (MAC) layer. To the best of our knowledge, this is the first effort which exploits spatial correlation in WSN on the MAC layer. A theoretical framework is developed for transmission regulation of sensor nodes under a distortion constraint. It is shown that a sensor node can act as a representative node for several other sensor nodes observing the correlated data. Based on the theoretical framework, a distributed, spatial Correlation-based Collaborative Medium Access Control (CC-MAC) protocol is then designed which has two components: Event MAC (E-MAC) and Network MAC (N-MAC). E-MAC filters out the correlation in sensor records while N-MAC prioritizes the transmission of route-thru packets. Simulation results show that CC-MAC achieves high performance in terms energy, packet drop rate, and latency.  相似文献   

11.
A distributed minimum variance estimator for sensor networks   总被引:2,自引:0,他引:2  
A distributed estimation algorithm for sensor networks is proposed. A noisy time-varying signal is jointly tracked by a network of sensor nodes, in which each node computes its estimate as a weighted sum of its own and its neighbors' measurements and estimates. The weights are adaptively updated to minimize the variance of the estimation error. Both estimation and the parameter optimization is distributed; no central coordination of the nodes is required. An upper bound of the error variance in each node is derived. This bound decreases with the number of neighboring nodes. The estimation properties of the algorithm are illustrated via computer simulations, which are intended to compare our estimator performance with distributed schemes that were proposed previously in the literature. The results of the paper allow to trading-off communication constraints, computing efforts and estimation quality for a class of distributed filtering problems.  相似文献   

12.
Access control is a prime technology to prevent unauthorized access to private information, which is one of the essential issues appearing in secure group communication (SGC) of wireless sensor networks (WSNs). Many studies have made good progress on access control; however, their methods are inadequate to cope with this new issue for SGC-based WSNs since of their inflexibility, inefficiency, insecurity, or small-scale.  相似文献   

13.
Collaborative beamforming has been recently introduced in the context of wireless sensor networks (WSNs) to increase the transmission range of individual sensor nodes. The challenge in using collaborative beamforming in WSNs is the uncertainty regarding the sensor node locations. However, the actual sensor node spatial distribution can be modeled by a properly selected probability density function (pdf). In this paper, we model the spatial distribution of sensor nodes in a cluster of WSN using Gaussian pdf. Gaussian pdf is more suitable in many WSN applications than, for example, uniform pdf which is commonly used for flat ad hoc networks. The average beampattern and its characteristics, the distribution of the beampattern level in the sidelobe region, and the distribution of the maximum sidelobe peak are derived using the theory of random arrays. We show that both the uniform and Gaussian sensor node deployments behave qualitatively in a similar way with respect to the beamwidths and sidelobe levels, while the Gaussian deployment gives wider mainlobe and has lower chance of large sidelobes.  相似文献   

14.
Pandey  Atul Kumar  Gupta  Nisha 《Wireless Networks》2020,26(4):2875-2889
Wireless Networks - In wireless sensor networks, a significant amount of energy is consumed by the sensor nodes during data packet transmission and reception. An IEEE 802.15.4 MAC protocol is not...  相似文献   

15.
This paper deals with two critical issues in wireless sensor networks: reducing the end-to-end packet delivery delay and increasing the network lifetime through the use of cooperative communications. Here, we propose a delay- and energy-aware cooperative medium access control (DEC-MAC) protocol, which trades off between the packet delivery delay and a node’s energy consumption while selecting a cooperative relay node. DEC-MAC attempts to balance the energy consumption of the sensor nodes by taking into account a node’s residual energy as part of the relay selection metric, thus increasing the network’s lifetime. The relay selection algorithm exploits the process of elimination and the complementary cumulative distribution function for determining the most optimal relay within the shortest time period. Our numerical analysis demonstrates that the DEC-MAC protocol is able to determine the optimal relay in no more than three mini slots. Our simulation results show that the DEC-MAC protocol improves the end-to-end packet delivery latency and the network lifetime significantly compared to the state-of-the-art protocols, LC-MAC and CoopMAC.  相似文献   

16.
Traditional single-channel MAC protocols for wireless ad hoc and sensor networks favor energy-efficiency over throughput. More recent multi-channel MAC protocols display higher throughput but less energy efficiency. In this article we propose NAMAC, a negotiator-based multi-channel MAC protocol in which specially designated nodes called negotiators maintain the sleeping and communication schedules of nodes within their communication ranges in static wireless ad hoc and sensor networks. Negotiators facilitate the assignation of channels and coordination of communications windows, thus allowing individual nodes to sleep and save energy. We formally define the problem of finding the optimal set of negotiators (i.e., minimizing the number of selected negotiators while maximizing the coverage of the negotiators) and prove that the problem is NP-Complete. Accordingly, we propose a greedy negotiator-election algorithm as part of NAMAC. In addition, we prove the correctness of NAMAC through a rigorous model checking and analyze various characteristics of NAMAC—the throughput of NAMAC, impact of negotiators on network capacity, and storage and computational overhead. Simulation results show that NAMAC, at high network loads, consumes 36 % less energy while providing 25 % more throughput than comparable state-of-art multi-channel MAC protocols for ad hoc networks. Additionally, we propose a lightweight version of NAMAC and show that it outperforms (55 % higher throughput with 36 % less energy) state-of-art MAC protocols for wireless sensor networks.  相似文献   

17.
We study the problem of minimizing data aggregation time in wireless sensor networks (WSNs) under the practical duty-cycle scenario where nodes switch between active states and dormant states periodically for energy efficiency. Under the protocol interference model, we show that the problem is NP-hard and present a lower bound of delay for any data aggregation scheme. To solve the problem efficiently, we then construct a routing tree based on connected dominator set and propose two aggregation scheduling algorithms, which are the centralized Greedy Aggregation Scheduling (GAS) and the distributed Partitioned Aggregation Scheduling (PAS), so as to generate collision-free transmission schedules for data aggregation in duty-cycled WSNs. To minimize the total delay, GAS tries to achieve maximal concurrent transmissions in each time-slot during each frame by using global information, while PAS leverages a network partition based strategy and local information to ensure the largest degree of channel reuse across space and time domains. Theoretical analysis indicates that each algorithm consumes at most \(O(R+\varDelta)\) frames and achieves nearly constant factor approximation on the optimal delay. Here R and \(\varDelta\) are the network radius and the maximum node degree, respectively. We also evaluate the practicability of our algorithms by extensive simulations under various network conditions and the results corroborate our theoretical analysis.  相似文献   

18.
Collaborative beamforming for distributed wireless ad hoc sensor networks   总被引:7,自引:0,他引:7  
The performance of collaborative beamforming is analyzed using the theory of random arrays. The statistical average and distribution of the beampattern of randomly generated phased arrays is derived in the framework of wireless ad hoc sensor networks. Each sensor node is assumed to have a single isotropic antenna and nodes in the cluster collaboratively transmit the signal such that the signal in the target direction is coherently added in the far-field region. It is shown that with N sensor nodes uniformly distributed over a disk, the directivity can approach N, provided that the nodes are located sparsely enough. The distribution of the maximum sidelobe peak is also studied. With the application to ad hoc networks in mind, two scenarios (closed-loop and open-loop) are considered. Associated with these scenarios, the effects of phase jitter and location estimation errors on the average beampattern are also analyzed.  相似文献   

19.
In recent years, there has been a marked increase in the use of wireless sensor networks in various environments such as crisis areas, military operations, and monitoring systems. These networks do not use a fixed network infrastructure and therefore they are a popular choice for highly dynamic environments. One of the main concerns in these networks is the topology management issue, which the clustering method is a subfield for that. The main objective of clustering methods is optimizing the energy consumption. This paper proposes a new clustering protocol, which uses many parameters such as the activity history of each node, local and general state of nodes and their resources condition to determine the best cluster heads and members of each cluster that can increase the network lifetime, fair resource consumption and network coverage.  相似文献   

20.
In this paper, the detection of a correlated Gaussian field using a large multi-hop sensor network is investigated. A cooperative routing strategy is proposed by introducing a new link metric that characterizes the detection error exponent. Derived from the Chernoff information and Schweppe's likelihood recursion, this link metric captures the contribution of a given link to the decay rate of error probability and has the form of the capacity of a Gaussian channel with the sender transmitting the innovation of its measurement. For one-dimensional Gauss-Markov fields, the link metric can be represented explicitly as a function of the link length. Cooperative routing is achieved using the Kalman data aggregation and shortest path routing. Numerical simulations show that cooperative routing can be significantly more energy efficient than noncooperative routing for the same detection performance  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号