• Title/Summary/Keyword: motes

Search Result 36, Processing Time 0.018 seconds

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

Effects of Staurosporine and Genistein on Superoxide and HOCl Production in C5a- or PMA-activated Neutrophils (Staurosporine과 Genistein이 C5a 또는 PMA에 의하여 활성화된 호중구에서의 Superoxide와 HOCl 생성에 나타내는 영향)

  • Yun Young-Chul;Kang Hee-Jeong;Shin Yong-Kyoo;Lee Chung-Soo
    • The Korean Journal of Pharmacology
    • /
    • v.31 no.1 s.57
    • /
    • pp.115-122
    • /
    • 1995
  • Effects of staurosporine, genistein and pertussis toxin on superoxide and HOCl production in C5a- or PMA-activated neutrophils were investigated. A C5a-induced superoxide and $H_2O_2$ production was inhibited by staurosporine, genistein and pertussis toxin. The stimulatory effect of PMA was inhibited by staurosporine but was not affected by pertussis toxin, whereas it was further promoted by genistein. Staurosporine and genistein inhibited superoxide production by sodium fluoride, but pertussis toxin did not affect it. PMA-induced $H_2O_2$ production was inhibited by staurosporine but was not affected by pertussis toxin. Genistein did not show a stimulatory effect on PMA-induced $H_2O_2$ production. Staurosporine and pertussis toxin inhibited HOCl production by C5a- or PMA, whereas genistein stimulated it. C5a-or PMA-induced myeloperoxidase release was inhibited by genistein, in this response the effect of pertussis toxin was not detected. Staurosporine did not affect the stimulatory effect of PMA on the release. Myeloperoxidase activity was markedly increased by genistein but was not affected by staurosporine and pertussis toxin. These results indicate that the respiratory burst of neutrophils may be regulated by protein kinase C and protein tyrosine kinase. Superoxide production induced by the direct activation of protein kinase C might be affected by protein tyrosine kinase oppositely. Genistein probably pro-motes HOCl production by activating myeloperoxidase.

  • PDF

Interactions between Collagen IV and Collagen-Binding Integrins in Renal Cell Repair after Sublethal Injury

  • Nony, Paul A,;Schnellmann, Rick G.
    • Proceedings of the Korea Environmental Mutagen Society Conference
    • /
    • 2002.11a
    • /
    • pp.80-88
    • /
    • 2002
  • Recent studies demonstrate that collagen IV selectively pro-motes the repair of physiological processes in sublethally injured renal proximal tubular ceils (RPTC). We sought to further define the mechanisms of cell repair by measuring the effects of toxicant injury and stimulation of repair by L-ascorbic acid-2-phosphate (AscP), exogenous collagen IV, or function-stimulating integrin antibodies on the expression and subcellular localization of collagen-binding integrins (CBI) in RPTC. Expression of CBI subunits ${\alpha}_1$, ${\alpha}_2$, and ${\beta}_1$ in RPTC was not altered on day 1 after sublethal injury by S-(1,2-dichlorovinyl)-L-cysteine (DCVC). On day 6, expression of ${\alpha}_1$ and ${\beta}_1$ subunits remained unchanged, whereas a 2.2-fold increase in ${\alpha}_2$ expression was evident in injured RPTC. CBI localization in control RPTC was limited exclusively to the basal membrane. On day 1 after injury, RPTC exhibited a marked inhibition of active $Na^+$ transport and a loss of cell polarity characterized by a decrease in basal CBI localization and the appearance of CBI on the apical membrane. On day 6 after injury, RPTC still exhibited marked inhibition of active $Na^+$ transport and localization of CBI to the apical membrane. However, DCVC-injured RPTC cultured in pharmacological concentrations of AscP (500 ${\mu}$M)or exogenous collagen IV (50 ${\mu}$g/ml) exhibited an increase inactive $Na^+$ transport, relocalization of CBI to the basal membrane, and the disappearance of CBI from the apical membrane on day 6. Function-stimulating antibodies to CBI ${\beta}_1$ did not promote basal relocalization of CBI despite stimulating the repair of $Na^+$/$K^+$-ATPase activity on day 6 after injury. These data demonstrate that DCVC disrupts integrin localization and that physiological repair stimulated by AscP or collagen IV is associated with the basal relocalization of CBI in DCVC-injured RPTC. These data also suggest that CBI-mediated repair of physiological functions may occur independently of integrin relocalization.

  • PDF

An Energy-efficient Edge Detection Method for Continuous Object Tracking in Wireless Sensor Networks (무선 센서 네트워크에서의 연속적인 물체의 추적을 위한 에너지 효율적인 경계 선정 기법)

  • Jang, Sang-Wook;Hahn, Joo-Sun;Ha, Rhan
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.514-527
    • /
    • 2009
  • Wireless sensor networks (WSNs) can be used in various applications for military or environmental purpose. Recently, there are lots of on-going researches for detecting and tracking the spread of continuous objects or phenomena such as poisonous gas, wildfires, earthquakes, and so on. Some previous work has proposed techniques to detect edge nodes of such a continuous object based on the information of all the 1-hop neighbor nodes. In those techniques, however, a number of nodes are redundantly selected as edge nodes, and thus, the boundary of the continuous object cannot be presented accurately. In this paper, we propose a new edge detection method in which edge nodes of the continuous object are detected based on the information of the neighbor nodes obtained via the Localized Delaunay Triangulation so that a minimum number of nodes are selected as edge nodes. We also define the sensor behavior rule for tracking continuous objects energy-efficiently. Our simulation results show that the proposed edge detection method provides enhanced performance compared with previous 1-hop neighbor node based methods. On the average, the accuracy is improved by 29.95% while the number of edge nodes, the amount of communication messages and energy consumption are reduced by 54.43%, 79.36% and 72.34%, respectively. Moreover, the number of edge nodes decreases by 48.38% on the average in our field test with MICAz motes.

TeloSIM: Instruction-level Sensor Network Simulator for Telos Sensor Node (TeloSIM: Telos 형 센서노드를 위한 명령어 수준 센서네트워크 시뮬레이터)

  • Joe, Hyun-Woo;Kim, Hyung-Shin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.11
    • /
    • pp.1021-1030
    • /
    • 2010
  • In the sensor network, many tiny nodes construct Ad-Hoc network using wireless interface. As this type of system consists of thousands of nodes, managing each sensor node in real world after deploying them is very difficult. In order to install the sensor network successfully, it is necessary to verify its software using a simulator beforehand. In fact Sensor network simulators require high fidelity and timing accuracy to be used as a design, implementation, and evaluation tool of wireless sensor networks. Cycle-accurate, instruction-level simulation is the known solution for those purposes. In this paper, we developed an instruction-level sensor network simulator for Telos sensor node as named TeloSlM. It consists of MSP430 and CC2420. Recently, Telos is the most popular mote because MSP430 can consume the minimum energy in recent motes and CC2420 can support Zigbee. So that TeloSlM can provide the easy way for the developers to verify software. It is cycle-accurate in instruction-level simulator that is indispensable for OS and the specific functions and can simulate scalable sensor network at the same time. In addition, TeloSlM provides the GUI Tool to show result easily.

Performance Analysis and Comparison of Stream Ciphers for Secure Sensor Networks (안전한 센서 네트워크를 위한 스트림 암호의 성능 비교 분석)

  • Yun, Min;Na, Hyoung-Jun;Lee, Mun-Kyu;Park, Kun-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.3-16
    • /
    • 2008
  • A Wireless Sensor Network (WSN for short) is a wireless network consisting of distributed small devices which are called sensor nodes or motes. Recently, there has been an extensive research on WSN and also on its security. For secure storage and secure transmission of the sensed information, sensor nodes should be equipped with cryptographic algorithms. Moreover, these algorithms should be efficiently implemented since sensor nodes are highly resource-constrained devices. There are already some existing algorithms applicable to sensor nodes, including public key ciphers such as TinyECC and standard block ciphers such as AES. Stream ciphers, however, are still to be analyzed, since they were only recently standardized in the eSTREAM project. In this paper, we implement over the MicaZ platform nine software-based stream ciphers out of the ten in the second and final phases of the eSTREAM project, and we evaluate their performance. Especially, we apply several optimization techniques to six ciphers including SOSEMANUK, Salsa20 and Rabbit, which have survived after the final phase of the eSTREAM project. We also present the implementation results of hardware-oriented stream ciphers and AES-CFB fur reference. According to our experiment, the encryption speeds of these software-based stream ciphers are in the range of 31-406Kbps, thus most of these ciphers are fairly acceptable fur sensor nodes. In particular, the survivors, SOSEMANUK, Salsa20 and Rabbit, show the throughputs of 406Kbps, 176Kbps and 121Kbps using 70KB, 14KB and 22KB of ROM and 2811B, 799B and 755B of RAM, respectively. From the viewpoint of encryption speed, the performances of these ciphers are much better than that of the software-based AES, which shows the speed of 106Kbps.