• Title/Summary/Keyword: Sensor nodes

Search Result 2,025, Processing Time 0.034 seconds

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

Energy-efficient Positioning of Cluster Heads in Wireless Sensor Networks

  • Sohn, Surg-Won;Han, Kwang-Rok
    • Journal of IKEEE
    • /
    • v.13 no.1
    • /
    • pp.71-76
    • /
    • 2009
  • As one of the most important requirements for wireless sensor networks, prolonging network lifetime can be realized by minimizing energy consumption in cluster heads as well as sensor nodes. While most of the previous researches have focused on the energy of sensor nodes, we devote our attention to cluster heads because they are most dominant source of power consumption in the cluster-based sensor networks. Therefore, we seek to minimize energy consumption by minimizing the maximum(MINMAX) energy dissipation at each cluster heads. This work requires energy-efficient clustering of the sensor nodes while satisfying given energy constraints. In this paper, we present a constraint satisfaction modeling of cluster-based routing in a heterogeneous sensor networks because mixed integer programming cannot provide solutions to this MINMAX problem. Computational experiments show that substantial energy savings can be obtained with the MINMAX algorithm in comparison with a minimum total energy(MTE) strategy.

  • PDF

Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.676-682
    • /
    • 2011
  • Sybil attack can disrupt proper operations of wireless sensor network by forging its sensor node to multiple identities. To protect the sensor network from such an attack, a number of countermeasure methods based on RSSI (Received Signal Strength Indicator) and LQI (Link Quality Indicator) have been proposed. However, previous works on the Sybil attack detection do not consider the fact that Sybil nodes can change their RSSI and LQI strength for their malicious purposes. In this paper, we present a Sybil attack detection method based on a transmission power range. Our proposed method initially measures range of RSSI and LQI from sensor nodes, and then set the minimum, maximum and average RSSI and LQI strength value. After initialization, monitoring nodes request that each sensor node transmits data with different transmission power strengths. If the value measured by monitoring node is out of the range in transmission power strengths, the node is considered as a malicious node.

A Sensor Network Security Protocol for Monitoring the State of Bridge (교량감시를 위한 센서 네트워크 보안프로토콜)

  • Lim, Hwa-Jung;Jeon, Jin-Soon;Lee, Heon-Guil
    • Journal of Industrial Technology
    • /
    • v.25 no.B
    • /
    • pp.211-220
    • /
    • 2005
  • The wireless sensor network consists of a number of sensor nodes which have physical constraints. Each sensor node senses surrounding environments and sends the sensed information to Sink. The inherent vulnerability in security of the sensor nodes has promoted the needs for the lightweight security protocol. In this paper, we propose a non-hierarchical sensor network and a security protocol that is suitable for monitoring the man-made objects such as bridges. Furthermore, we present the efficient way of setting the routing path by storing IDs, MAC(message authentication code) and the location information of the nodes, and taking advantage of the two node states, Sleep and Awake. This also will result in the reduced energy consuming rate.

  • PDF

Design of Coordinator Based on Android for Data Collection in Body Sensor Network

  • Min, Seongwon;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.98-105
    • /
    • 2017
  • Smartphones are fast growing in the IT market and are the most influential devices in our daily life. Smartphones are being studied for their use in body sensor networks with excellent processing power and wireless communication technology. In this paper, we propose a coordinator design that provides data collection, classification, and display using based on Android-smartphone in multiple sensor nodes. The coordinator collects data of sensor nodes that measure biological patterns using wireless communication technologies such as Bluetooth and NFC. The coordinator constructs a network using a multiple-level scheduling algorithm for efficient data collection at multiple sensor nodes. Also, to support different protocols between heterogeneous sensors, a data sheet recording wireless communication protocol information is used. The designed coordinator used Arduino to test the performance of multiple sensor node environments.

Enhancing Method to make Cluster for Filtering-based Sensor Networks (여과기법 보안효율을 높이기 위한 센서네트워크 클러스터링 방법)

  • Kim, Byung-Hee;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.141-145
    • /
    • 2008
  • Wireless sensor network (WSN) is expected to be used in many applications. However, sensor nodes still have some secure problems to use them in the real applications. They are typically deployed on open, wide, and unattended environments. An adversary using these features can easily compromise the deployed sensor nodes and use compromised sensor nodes to inject fabricated data to the sensor network (false data injection attack). The injected fabricated data drains much energy of them and causes a false alarm. To detect and drop the injected fabricated data, a filtering-based security method and adaptive methods are proposed. The number of different partitions is important to make event report since they can make a correctness event report if the representative node does not receive message authentication codes made by the different partition keys. The proposed methods cannot guarantee the detection power since they do not consider the filtering scheme. We proposed clustering method for filtering-based secure methods. Our proposed method uses fuzzy system to enhance the detection power of a cluster.

  • PDF

Sequential localization with Beacon Nodes along the Seashore for Marine Monitoring Sensor Network (해안에 설치된 비콘 노드를 이용한 해양 모니터링 센서의 순차적인 위치 파악)

  • Kim, Chung-San;Kim, Eun-Chan;Kim, Ki-Seon;Choi, Young-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.269-277
    • /
    • 2007
  • Wireless sensor network system is expected to get high attention in research for now and future owing to the advanced hardware development technology and its various applicabilities. Among variety of sensor network systems, the seashore and marine sensor network, which are extended to get sampling of marine resources, environmental monitoring to prevent disaster and to be applied to the area of sea route guidance. For these marine applications to be available, however, the provision of precise location information of every sensor nodes is essential. In this paper, the sequential localization algorithm for obtaining the location information of marine sensor nodes. The sequential localization is done with the utilization of a small number of beacon nodes along the seashore and gets the location of nodes by controling the sequences of localization and also minimizes the error accumulation. The key idea of this algorithm for localization is that the localization priority of each sensor nodes is determined by the number of reference nodes' information. This sequential algorithm shows the improved error performance and also provide the increased coverage of marine sensor network by enabling the maximum localization of sensor nodes as possible.

  • PDF

The Pumping Node Architecture to Solve the Traffic Congestion Problem due to the Crowds of Mobile Nodes in Wireless Sensor Networks (고정 노드와 이동 노드가 상존하는 센서 네트워크에서 이동 노드 몰림 현상으로 인한 폭주 현상 해결을 위한 펌핑 노드 구조)

  • Lee, Dong-Kyu;Kim, Byung-Chul;Park, Sung-Ho;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.777-785
    • /
    • 2009
  • In recent wireless sensor networks, stationary nodes and mobile nodes co-exist to provide a diverse service. However, because there are multiple mobile nodes located in the wireless sensor network, there is a potential for the instability due to the frequent network reconfiguration and the traffic caused by densely concentration of mobile nodes while mobile nodes are switching locations. In order to solve this problem, we propose the pumping node architecture to solve this traffic congestion problem due to the crowds of mobile nodes. The pumping node can be reduced heavy traffic by pumping through the backbone network caused by the densely concentration of the mobile nodes. As a result, the architecture reduces the traffic in the sensor network with high reliability.

A Rendezvous Node Selection and Routing Algorithm for Mobile Wireless Sensor Network

  • Hu, Yifan;Zheng, Yi;Wu, Xiaoming;Liu, Hailin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4738-4753
    • /
    • 2018
  • Efficient rendezvous node selection and routing algorithm (RNSRA) for wireless sensor networks with mobile sink that visits rendezvous node to gather data from sensor nodes is proposed. In order to plan an optimal moving tour for mobile sink and avoid energy hole problem, we develop the RNSRA to find optimal rendezvous nodes (RN) for the mobile sink to visit. The RNSRA can select the set of RNs to act as store points for the mobile sink, and search for the optimal multi-hop path between source nodes and rendezvous node, so that the rendezvous node could gather information from sensor nodes periodically. Fitness function with several factors is calculated to find suitable RNs from sensor nodes, and the artificial bee colony optimization algorithm (ABC) is used to optimize the selection of optimal multi-hop path, in order to forward data to the nearest RN. Therefore the energy consumption of sensor nodes is minimized and balanced. Our method is validated by extensive simulations and illustrates the novel capability for maintaining the network robustness against sink moving problem, the results show that the RNSRA could reduce energy consumption by 6% and increase network lifetime by 5% as comparing with several existing algorithms.

Design of Energy Prediction Model for Solar-Powered Wireless Sensor Nodes (태양 에너지 기반 무선 센서 노드를 위한 에너지 예측 모델의 설계)

  • Nayantai, Bulganbat;Kong, In-Yeup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.858-861
    • /
    • 2012
  • Distributed sensor nodes for environmental monitoring, have a problem of difficult and expensive battery change. In this case, renewable energy such as solar energy is helpful. We can use high-quality solar energy everyday. In this paper, we model photovoltaic energy prediction model for sensor nodes, which includes charge and discharge characteristics as well as seasonal and monthly characteristics of the solar energy. Our model is useful to predict energy consumption of solar-powered sensor nodes realistically using real world use data of the nodes.

  • PDF