• Title/Summary/Keyword: Wireless Sensor Networks(WSN)

Search Result 459, Processing Time 0.02 seconds

A Study on the WSN Construction Factors for Implementation of U-Disaster Prevention (u-방재 기술 구현을 위한 WSN 구축요소에 관한 연구)

  • Lee, Seok-Cheol;Jeon, Tae-Gun;Sim, Hye-In;Kim, Chang-Soo
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.361-364
    • /
    • 2008
  • The Application Model in Wireless Sensor Networks(WSNs) consist of wireless sensor network based on sensor hardwares which is combined the micro-controller, chipset for wireless communication and sensors, middleware for dealing with data processing and user application for common service. Applications in WSN have been applied for environmental monitoring, smart factory and have concentrated the services based on remote monitoring applications which is difficult to watch the situation by human. In this paper, we described the construction model for applying for the Ubiquitous disaster prevention system and deal with its conformity. The proposed system includes the selecting the wireless sensor hardware, routing technique for u-Disaster Prevention, composition of middleware and web-interface for application services.

  • PDF

Robust Bidirectional Verification Scheme for Detecting Sinkhole Attacks in INSENS of Sensor Networks (센서 네트워크의 INSENS에서 싱크홀 공격을 탐지하기 위한 강인한 양방향 인증 기법)

  • Song, Kyu-hyun;Cho, Tae-ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.77-80
    • /
    • 2015
  • 무선통신을 기반으로 하는 WSN은 통신의 특성상 네트워크보안에 취약점을 가진다. 무선통신의 취약점은 누구나 네트워크에 접근이 가능하다는 것이다. 이에 따라 침입에 강인한 무선 센서 네트워크인 INtrusion-tolerant routing protocol for wireless SEnsor NetworkS(INSENS)가 제안됨으로써 WSN의 초기 라우팅 설정 시 침입하는 공격자를 사전에 차단할 수 있게 되었다. 그러나 라우팅 설정 후에 노드가 공격자에 의해 훼손당하게 된다면, 노드의 주요정보를 이용해 공격자는 또다시 라우팅 공격이 가능해진다. 본 논문에서는 공격자에 의해 훼손된 노드가 라우팅 공격 중 대표적인 공격인 싱크홀 공격 메시지를 방송하였을 때, 페어와이즈 키를 통해 효과적으로 공격메시지를 차단하는 양방향인증기법을 제안한다. 이로써 INSENS에서 발생하는 싱크홀 공격을 차단함으로써 WSN의 보안 강화에 기여한다.

  • PDF

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)

  • Sharif, Lukman;Ahmed, Munir
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.177-184
    • /
    • 2010
  • Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs. In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.

Quality of Service using Min-Max Data Size Scheduling in Wireless Sensor Networks

  • Revathi, A.;Santhi, S.G.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.327-333
    • /
    • 2022
  • Wireless Sensor Networks (WSNs) plays an important role in our everyday life. WSN is distributed in all the places. Nowadays WSN devices are developing our world as smart and easy to access and user-friendly. The sensor is connected to all the resources based on the uses of devices and the environment [1]. In WSN, Quality of Service is based on time synchronization and scheduling. Scheduling is important in WSN. The schedule is based on time synchronization. Min-Max data size scheduling is used in this proposed work. It is used to reduce the Delay & Energy. In this proposed work, Two-hop neighboring node is used to reduce energy consumption. Data Scheduling is used to identify the shortest path and transmit the data based on weightage. The data size is identified by three size of measurement Min, Max and Medium. The data transmission is based on time, energy, delivery, etc., the data are sent through the first level shortest path, then the data size medium, the second level shortest path is used to send the data, then the data size is small, it should be sent through the third level shortest path.

Analytical Approach of Multicasting-supported Inter-Domain Mobility Management in Sensor-based Fast Proxy Mobile IPv6 Networks

  • Jang, Ha-Na;Jeong, Jong-Pil
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.1-11
    • /
    • 2012
  • IP-based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health care, home automation, environmental monitoring, industrial control, vehicle telematics, and agricultural monitoring. In all these applications, a fundamental issue is the mobility in the sensor network, particularly with regards to energy efficiency. Because of the energy inefficiency of network-based mobility management protocols, they can be supported via IP-WSNs. In this paper, we propose a network-based mobility-supported IP-WSN protocol called mSFP, or the mSFP: "Multicasting-supported Inter-Domain Mobility Management Scheme in Sensor-based Fast Proxy Mobile IPv6 Networks". Based on [8,20], we present its network architecture and evaluate its performance by considering the signaling and mobility cost. Our analysis shows that the proposed scheme reduces the signaling cost, total cost, and mobility cost. With respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 7% and the total cost by 3%. With respect to the number of hops, the proposed scheme reduces the signaling cost by 6.9%, the total cost by 2.5%, and the mobility cost by 1.5%. With respect to the number of IP-WSN nodes, the proposed scheme reduces the mobility cost by 1.6%.

Attacks, Detection, and Countermeasures in WSN Network Layer (WSN의 네트워크 계층에서의 공격과 탐지 및 대응 방안)

  • Lee, Daeun;Rhee, Eugene
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.413-418
    • /
    • 2019
  • Attacks on existing sensor networks include sniffing, flooding, and spoofing attacks. The basic countermeasures include encryption and authentication methods and switching methods. Wormhole attack, HELLO flood attack, Sybil attack, sinkhole attack, and selective delivery attack are the attacks on the network layer in wireless sensor network (WSN). These attacks may not be defended by the basic countmeasures mentioned above. In this paper, new countermeasures against these attacks include periodic key changes and regular network monitoring. Moreover, we present various threats (attacks) in the network layer of wireless sensor networks and new countermeasures accordingly.

Modeling and Analysis of Vehicle Detection Using Roadside Ultrasonic Sensors in Wireless Sensor Networks (WSN 기반 노변 초음파 센서를 이용한 차량인식에 대한 모델링 및 분석)

  • Jo, Youngtae;Jung, Inbum
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.745-761
    • /
    • 2014
  • To address the problems of existing traffic information acquisition systems such as high cost and low scalability, wireless sensor networks (WSN)-based traffic information acquisition systems have been studied. WSN-based systems have many benefits including high scalability and low maintenance cost. Recently, various sensors are studied for traffic surveillance based on WSN, such as magnetic, acoustic, and accelerometer sensors. However, ultrasonic sensor based systems have not been studied. There are many issues for WSN-based systems, such as battery driven operation and low computing power. Thus, power saving methods and specific algorithms with low complexity are necessary. In this paper, we introduce optimal methodologies for power saving of ultrasonic sensors based on the modeling and analysis in detail. Moreover, a new vehicle detection algorithm for low complexity using ultrasonic data is presented. The proposed methodologies are implemented in a tiny microprocessor. The evaluation results show that our algorithm has high detection accuracy.

Cluster-based Energy-aware Data Sharing Scheme to Support a Mobile Sink in Solar-Powered Wireless Sensor Networks (태양 에너지 수집형 센서 네트워크에서 모바일 싱크를 지원하기 위한 클러스터 기반 에너지 인지 데이터 공유 기법)

  • Lee, Hong Seob;Yi, Jun Min;Kim, Jaeung;Noh, Dong Kun
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1430-1440
    • /
    • 2015
  • In contrast with battery-based wireless sensor networks (WSNs), solar-powered WSNs can operate for a longtime assuming that there is no hardware fault. Meanwhile, a mobile sink can save the energy consumption of WSN, but its ineffective movement may incur so much energy waste of not only itself but also an entire network. To solve this problem, many approaches, in which a mobile sink visits only on clustering-head nodes, have been proposed. But, the clustering scheme also has its own problems such as energy imbalance and data instability. In this study, therefore, a cluster-based energy-aware data-sharing scheme (CE-DSS) is proposed to effectively support a mobile sink in a solar-powered WSN. By utilizing the redundant energy efficiently, CE-DSS shares the gathered data among cluster-heads, while minimizing the unexpected black-out time. The simulation results show that CE-DSS increases the data reliability as well as conserves the energy of the mobile sink.

Review of Simultaneous Wireless Information and Power Transfer in Wireless Sensor Networks

  • Asiedu, Derek Kwaku Pobi;Shin, Suho;Koumadi, Koudjo M.;Lee, Kyoung-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.2
    • /
    • pp.105-116
    • /
    • 2019
  • Recently, there has been an increase in research on wireless sensor networks (WSNs) because they are easy to deploy in applications such as internet-of-things (IoT) and body area networks. However, WSNs have constraints in terms of power, quality-of-service (QoS), computation, and others. To overcome the power constraint issues, wireless energy harvesting has been introduced into WSNs, the application of which has been the focus of many studies. Additionally, to improve system performance in terms of achievable rate, cooperative networks are also being explored in WSNs. We present a review on current research in the area of energy harvesting in WSNs, specifically on the application of simultaneous wireless information and power transfer (SWIPT) in a cooperative sensor network. In addition, we discuss possible future extensions of SWIPT and cooperative networks in WSNs.

The Energy Performance Analysis Between Synchronous and Asynchronous Duty Cycle based MAC Protocols in Wireless Sensor Networks (무선 센서네트워크 환경에서 Duty Cycle 기반 동기식 및 비동기식 MAC 프로토콜의 에너지 성능과 지연시간에 대한 상호 분석)

  • Lee, Jae-Ho;Eom, Doo-Seop
    • Journal of Information Technology Services
    • /
    • v.10 no.3
    • /
    • pp.237-250
    • /
    • 2011
  • Recently, Wireless Sensor Networks (WSN) require energy performance and guaranteed delivery delay time, contrarily with previous MAC protocols that aim to high throughput mostly. In order to satisfy the new significant requirements, many MAC protocols of WSN employ and try to enhance the duty cycle mechanism which is energy efficient technique in MAC layer. This duty cycle mechanism is oriented by toggling the transceiver conditions composed of wakeup and sleep states. The synchronous MAC protocols perform the period synchronization process. Hence, these are energy efficient in periodic monitoring environment, but are inefficient in where an event is incurred rarely and infrequently. Otherwise, the performance of asynchronous MAC protocols are contrarily with synchronous protocols. In this paper, we design two models consisting Always-busy and Always-idle ti simplify the general network congestion conditions. Through these models, moreover, we analyze two types MAC protocols in terms of energy efficiency and delay performance by analytical results. Additionally, we also evaluate two MAC protocols with two gongestion models that we designed. By the analytical and simulated results, we provide the general and efficient decision method in which protocols are more appropriate in a certain WSN environment.