首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make‐up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad‐hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

2.
The emergence of wireless sensor networks (WSNs) in healthcare applications is gaining momentum through the increasing array of wearable vital sign sensors and location tags which can track both healthcare personnel and patient status/ location continuously in real-time mode. Despite the increased range of potential application frameworks — ranging from pre-hospital, in-hospital, ambulatory and home monitoring, to long-term database collection for longitudinal trend analysis — the security gap between existing WSN designs and the requirements of medical applications remains unresolved. Generally, WSN devices are extremely limited in terms of power, computation, and communication. They are often deployed in accessible areas, thus increasing security vulnerabilities. The dynamic ad hoc topology, multicast transmission, location awareness, critical data prioritisation, and co-ordination of diverse sensors of healthcare applications further exacerbate the security challenges. This paper presents an analysis of various WSN security mechanisms from the demanding perspective of healthcare applications, and considers the importance of security to the successful deployment of pervasive computing solutions in the healthcare industry.  相似文献   

3.
Relay sensor placement in wireless sensor networks   总被引:4,自引:0,他引:4  
This paper addresses the following relay sensor placement problem: given the set of duty sensors in the plane and the upper bound of the transmission range, compute the minimum number of relay sensors such that the induced topology by all sensors is globally connected. This problem is motivated by practically considering the tradeoff among performance, lifetime, and cost when designing sensor networks. In our study, this problem is modelled by a NP-hard network optimization problem named Steiner Minimum Tree with Minimum number of Steiner Points and bounded edge length (SMT-MSP). In this paper, we propose two approximate algorithms, and conduct detailed performance analysis. The first algorithm has a performance ratio of 3 and the second has a performance ratio of 2.5. Xiuzhen Cheng is an Assistant Professor in the Department of Computer Science at the George Washington University. She received her MS and PhD degrees in Computer Science from the University of Minnesota - Twin Cities in 2000 and 2002, respectively. Her current research interests include Wireless and Mobile Computing, Sensor Networks, Wireless Security, Statistical Pattern Recognition, Approximation Algorithm Design and Analysis, and Computational Medicine. She is an editor for the International Journal on Ad Hoc and Ubiquitous Computing and the International Journal of Sensor Networks. Dr. Cheng is a member of IEEE and ACM. She received the National Science Foundation CAREER Award in 2004. Ding-Zhu Du received his M.S. degree in 1982 from Institute of Applied Mathematics, Chinese Academy of Sciences, and his Ph.D. degree in 1985 from the University of California at Santa Barbara. He worked at Mathematical Sciences Research Institutea, Berkeley in 1985-86, at MIT in 1986-87, and at Princeton University in 1990-91. He was an associate-professor/professor at Department of Computer Science and Engineering, University of Minnesota in 1991-2005, a professor at City University of Hong Kong in 1998-1999, a research professor at Institute of Applied Mathematics, Chinese Academy of Sciences in 1987-2002, and a Program Director at National Science Foundation of USA in 2002-2005. Currently, he is a professor at Department of Computer Science, University of Texas at Dallas and the Dean of Science at Xi’an Jiaotong University. His research interests include design and analysis of algorithms for combinatorial optimization problems in communication networks and bioinformatics. He has published more than 140 journal papers and 10 written books. He is the editor-in-chief of Journal of Combinatorial Optimization and book series on Network Theory and Applications. He is also in editorial boards of more than 15 journals. Lusheng Wang received his PhD degree from McMaster University in 1995. He is an associate professor at City University of Hong Kong. His research interests include networks, algorithms and Bioinformatics. He is a member of IEEE and IEEE Computer Society. Baogang Xu received his PhD degree from Shandong University in 1997. He is a professor at Nanjing Normal University. His research interests include graph theory and algorithms on graphs.  相似文献   

4.
In 2008, Das and Joshi proposed a new dynamic program update protocol for wireless sensor networks using the orthogonality principle. We identify an inherent flaw in their design and demonstrate that the Das-Joshi scheme is vulnerable to an impersonation attack, in violation of their security claim. We then present a modified scheme to eliminate the security vulnerability.  相似文献   

5.
In the paper, we will introduce the mechanisms and the weaknesses of the Wired Equivalent Privacy (WEP) and 802.1 li security procedures in the wireless networks. After that, the Wi-Fi Protected Access (WPA), a standards-based security mechanism that can eliminate most of 802.11 security problems will be introduced.  相似文献   

6.
The goal of this feature topic is to report recent advances in and significant contributions to all aspects of security in resource-constrained mobile ad hoc and sensor networks. Specific areas of interest include key management, secure communications, secure location discovery, secure clock synchronization, and intrusion detection.  相似文献   

7.
Multimedia communication in wireless sensor networks   总被引:1,自引:0,他引:1  
The technological advances in Micro ElectroMechanical Systems (Mems) and wireless communications have enabled the realization of wireless sensor networks (Wsn) comprised of large number of low-cost, low-power, multifunctional sensor nodes. These tiny sensor nodes communicate in short distances and collaboratively work toward fulfilling the application specific objectives ofWsn. However, realization of wide range of envisionedWsn applications necessitates effective communication protocols which can address the unique challenges posed by theWsn paradigm. Since many of these envisioned applications may also involve in collecting information in the form of multimedia such as audio, image, and video; additional challenges due to the unique requirements of multimedia delivery overWsn, e.g., diverse reliability requirements, time constraints, high bandwidth demands, must be addressed as well. Thus far, vast majority of the research efforts has been focused on addressing the problems of conventional data communication inWsn. Therefore, there exists an urgent need for research on the problems of multimedia communication inWsn. In this paper, a survey of the research challenges and the current status of the literature on the multimedia communication inWsn is presented. More specifically, the multimediaWsn applications, factors influencing multimedia delivery overWsn, currently proposed solutions in application, transport, and network layers, are pointed out along with their shortcomings and open research issues.  相似文献   

8.
Mobility-based communication in wireless sensor networks   总被引:2,自引:0,他引:2  
  相似文献   

9.
Since energy is scarce in sensor nodes, wireless sensor networks aim to transmit as few packets as possible. To achieve this goal, sensor protocols often aggregate measured data from multiple sensor nodes into a single packet. In this paper, a survey of aggregation techniques and methods is given. Based on this survey, it is concluded that there are currently several dependencies between the aggregation method and the behavior of the other network layers. As a result, existing aggregation methods can often not be combined with different routing protocols. To remedy this shortcoming, the paper introduces a new ‘non-intrusive’ aggregation approach which is independent of the routing protocol. The proposed aggregation method is evaluated and compared to traditional aggregation approaches using a large-scale sensor testbed of 200 TMoteSky sensor nodes. Our experimental results indicate that existing aggregation approaches are only suited for a limited set of network scenarios. In addition, it is shown both mathematically and experimentally that our approach outperforms existing non-intrusive techniques in a wide range of scenarios.  相似文献   

10.
Access control in wireless sensor networks   总被引:2,自引:0,他引:2  
Yun  Yanchao  Yuguang   《Ad hoc Networks》2007,5(1):3-13
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious “new” nodes through many kinds of attacks. To prevent malicious nodes from joining the sensor network, access control is required in the design of sensor network protocols. In this paper, we propose an access control protocol based on Elliptic Curve Cryptography (ECC) for sensor networks. Our access control protocol accomplishes node authentication and key establishment for new nodes. Different from conventional authentication methods based on the node identity, our access control protocol includes both the node identity and the node bootstrapping time into the authentication procedure. Hence our access control protocol cannot only identify the identity of each node but also differentiate between old nodes and new nodes. In addition, each new node can establish shared keys with its neighbors during the node authentication procedure. Compared with conventional sensor network security solutions, our access control protocol can defend against most well-recognized attacks in sensor networks, and achieve better computation and communication performance due to the more efficient algorithms based on ECC than those based on RSA.  相似文献   

11.
Two new incremental models for online anomaly detection in data streams at nodes in wireless sensor networks are discussed. These models are incremental versions of a model that uses ellipsoids to detect first, second, and higher‐ordered anomalies in arrears. The incremental versions can also be used this way but have additional capabilities offered by processing data incrementally as they arrive in time. Specifically, they can detect anomalies ‘on‐the‐fly’ in near real time. They can also be used to track temporal changes in near real‐time because of sensor drift, cyclic variation, or seasonal changes. One of the new models has a mechanism that enables graceful degradation of inputs in the distant past (fading memory). Three real datasets from single sensors in deployed environmental monitoring networks are used to illustrate various facets of the new models. Examples compare the incremental version with the previous batch and dynamic models and show that the incremental versions can detect various types of dynamic anomalies in near real time. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

12.
Fault management in wireless sensor networks   总被引:2,自引:0,他引:2  
Wireless sensor networks (WSNs) have gradually emerged as one of the key growth areas for pervasive computing in the twenty-first century. Recent advances in WSN technologies have made possible the development of new wireless monitoring and environmental control applications. However, the nature of these applications and harsh environments also created significant challenges for sensor networks to maintain a high quality of service in potentially harsh environments. Therefore, efficient fault management and robust management architectures have become essential for WSNs. In this article, we address these challenges by surveying existing fault management approaches for WSNs. We divide the fault management process into three phases: fault detection, diagnosis, and recovery and classify existing approaches according to these phases. Finally, we outline future challenges for fault management in WSNs.  相似文献   

13.
The progress of development on sensor networks has inspired many new applications. Some of these applications require the target to be observed by more than one sensors simultaneously. Sensor coverage, which reflects how well a sensor network is monitored by sensors, is an important measure for the quality of service (QoS) that a sensor network can provide. In this paper, we addressed the coverage problem from two different view points and referred to them as the worst-case and best-case coverage problems. Most existing works on these two problems assumed that the coverage degree is one (i.e. the target area falls within the sensing range of at least one sensor). In this paper, we address the k-coverage problem, where the coverage degree is a user-defined parameter k. This is a generalization of the earlier work where only k=1 is assumed. By combining geometric and algorithmic techniques, we establish optimal algorithms to solve the two variants of the k-coverage problem in polynomial time. An important extension of our study on the k-coverage problem was also proposed: the distributed algorithm for the problem. This helps in applying the proposed algorithm under more practical scenarios.  相似文献   

14.
Distributed learning in wireless sensor networks   总被引:2,自引:0,他引:2  
This paper discusses nonparametric distributed learning. After reviewing the classical learning model and highlighting the success of machine learning in centralized settings, the challenges that wireless sensor networks (WSN) pose for distributed learning are discussed, and research aimed at addressing these challenges is surveyed.  相似文献   

15.
Anomaly detection in wireless sensor networks is an important challenge for tasks such as fault diagnosis, intrusion detection, and monitoring applications. The algorithms developed for anomaly detection have to consider the inherent limitations of sensor networks in their design so that the energy consumption in sensor nodes is minimized and the lifetime of the network is maximized. In this survey article we analyze the state of the art in anomaly detection techniques for wireless sensor networks and discuss some open issues for research.  相似文献   

16.
Ossama  Marwan  Srinivasan   《Ad hoc Networks》2008,6(7):1078-1097
In scenarios where sensors are placed randomly, redundant deployment is essential for ensuring adequate field coverage. This redundancy needs to be efficiently exploited by periodically selecting a subset of nodes (referred to as a “cover”) that actively monitor the field, and putting the remaining nodes to sleep. We consider networks in which sensors are not aware of their locations or the relative directions of their neighbors. We develop several geometric and density-based tests that enable a location-unaware sensor to intelligently determine whether it should turn itself off without degrading the quality of field coverage. These tests rely on distance measurements and exchanged two-hop neighborhood information. We design an algorithm (LUC) that exploits these tests for computing covers. Based on this algorithm, we propose two distributed protocols (LUC-I and LUC-P) that periodically select covers and switch between them so as to extend the network lifetime and tolerate unexpected failures. Our protocols are highly efficient in terms of message overhead and processing complexity. We implement LUC-I in TinyOS and evaluate it using the TOSSIM simulator. Experimental results indicate that our approach significantly prolongs the network lifetime and achieves comparable performance to location-aware protocols.  相似文献   

17.
针对无线传感器网络节点能量受限制问题,提出一种节能网络,把监测环境中通电电缆的磁能转化为电能,实现节点能量的自给。采集的能量采用双边调谐阻抗网络传输,通过设计原副边回路参数,令其回路发生谐振来降低自身损耗;组网模式上,用节能静态网络模型代替能耗大的动态组网方式,结合需要,通过切换节点的工作方式来降低能耗。实验证明,能量采集模块一个工作周期采集的能量为10.93 mJ,能够满足传感网络节点工作周期的最大能耗4.68 mJ,验证了节能传感网络可以实现能量自給。  相似文献   

18.
在信息化时代,信息的接收、处理及分析对用户而言至关重要。特别是信息的接收环节,若收集到的信息不全、有误或者接收不到,后续工作都将无法开展。无线传感器是专门用于接收信息的一类工具,通过网络操作,使人们收集到自己想要的信息。无线传感器网络节点的特点是智能化、功率损耗小、能接收大量信息,传感器的工作运行离不开网络。文章对无线传感器目前的发展现状、技术特点以及应用前景等方面进行了阐述。  相似文献   

19.
The operation principles of wireless body-area networks (WBANs) and requirements to their infrastructure are described. The new IEEE 802.15.6 WBAN standard, in which an ultrawideband (UWB) signal is used as an information carrier, is discussed. The general properties of the given standard and its distinctions from the existing wireless personal communications standards are analyzed. It is demonstrated that UWB direct chaotic transceivers are promising for use in the wireless sensor networks based on the new standard.  相似文献   

20.
Group communications in wireless networks has been facilitating many emerging applications that require packet delivery from one or more sender(s) to multiple receivers. Due to insecure wireless channels, group communications are susceptible to various kinds of attacks. Although a number of proposals have been reported to secure group communications, provisioning security in group communications in wireless networks remains a critical and challenging issue. This article presents a survey of recent advances in security requirements and services in group communications in three types of wireless networks, and discusses challenges in designing secure group communications in these networks: wireless infrastructure networks, mobile ad hoc networks, and wireless sensor networks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号