• Title/Summary/Keyword: wsn

Search Result 891, Processing Time 0.036 seconds

Defense against HELLO Flood Attack in Wireless Sensor Network

  • Hamid Md. Abdul;Hong Choong Seon;Byun Sang Ick
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.214-216
    • /
    • 2005
  • We consider Wireless Sensor Network Security (WSN) and focus our attention to tolerate damage caused by an adversary who has compromised deployed sensor node to modify, block, or inject packets. We adopt a probabilistic secret sharing protocol where secrets shared between two sensor nodes are not exposed to any other nodes. Adapting to WSN characteristics, we incorporate these secrets to establish new pairwise key for node to node authentication and design multipath routing to multiple base stations to defend against HELLO flood attacks. We then analytically show that our defense mechanisms against HELLO flood attack can tolerate damage caused by an intruder.

  • PDF

A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance

  • Lee, Hoo-Rock;Chung, Kyung-Yul;Jhang, Kyoung-Son
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.237-246
    • /
    • 2013
  • Maintenance Access Hatches are used to ensure urban safety and aesthetics while facilitating the management of power lines, telecommunication lines, and gas pipes. Such facilities necessitate affordable and effective surveillance. In this paper, we propose a FiCHS (Fixed Cluster head centralized Hierarchical Static clustering) routing protocol that is suitable for underground maintenance hatches using WSN (Wireless Sensor Network) technology. FiCHS is compared with three other protocols, LEACH, LEACH-C, and a simplified LEACH, based on an ns-2 simulation. FiCHS was observed to exhibit the highest levels of power and data transfer efficiency.

Reader Collision Avoidance Scheme for Mobile RFID-Sensor Integrated Networks

  • Ko, Doo-Hyun;Kim, Song-Min;Lee, Sang-Bin;An, Sun-Shin
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.108-117
    • /
    • 2009
  • In recent years, one of alternatives for constructing RFID networks that provide mobile services is using wireless sensor networks (WSN) to enhance network capacity, utility and scalability. Due to absence of compatible reader anti-collision control and channel capture phenomenon, the medium access control protocols as used in the RFID networks lead to reader collision and starvation problem. In this paper, we develop a MAC protocol which is called Enhanced Collision Avoidance MAC (ECO) to avoid reader to reader collisions in an integrated RFID network. ECO is a CSMA-based MAC protocol, and operates on integrated nodes which consist of a RFID reader and a mote. Performance evaluation shows superior results to pure-CSMA protocols under dense deployment environments, both in number of failures and in throughput.

  • PDF

Implementation of Real-Time Monitoring System for Livestock Growth Environment Information using Wireless Sensor Network (무선센서 네트워크를 이용한 가축생육환경정보 실시간 모니터링 시스템 구현)

  • Kim, Young-Wung;Paik, Seung-Hyun;Jon, Yong-Jun;Lee, Dae-Ki;Park, Hong Bae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.6
    • /
    • pp.301-309
    • /
    • 2012
  • In this paper, a real-time monitoring system based on WSN is designed and implemented to monitor livestock growth environment information which includes the temperature, humidity and harmful gases such as $CO_{2},\;CO,\;NH_{3},\;H_{2}S$ and so on. The proposed system consists of the wireless sensor nodes, the monitoring management device, the management server and the user interface program based on PC/Smart phone. To verify the performance of the implemented system, gas measurement experiments are performed in laboratory environment by using the designed wireless sensor nodes. And it is able to estimate the concentration of gases. The implemented system is able to monitor the proposed environmental element information through the developed GUI.

Dual Addressing Scheme in IPv6 over IEEE 802.15.4 Wireless Sensor Networks

  • Yang, Soo-Young;Park, Sung-Jin;Lee, Eun-Ju;Ryu, Jae-Hong;Kim, Bong-Soo;Kim, Hyung-Seok
    • ETRI Journal
    • /
    • v.30 no.5
    • /
    • pp.674-684
    • /
    • 2008
  • This paper proposes a dual addressing scheme (DAS) for IPv6 over IEEE 802.15.4 wireless sensor networks (WSN). DAS combines a global unicast address to cope with association link changes and node mobility, and it links local addresses to lighten the overhead of the system to save energy and resources. This paper describes DAS address formats, address autoconfiguration, and address translation tables in the gateway. A detailed description of DAS is provided through examples. Simulations are performed to demonstrate the performance improvements of the DAS compared with the IPv6-based WSN, which uses the conventional single address.

  • PDF

A WSN-based Safety Management System Design for Children-Crime in School-Zoon (스쿨존에서 WSN 기반의 어린이 범죄 안전관리 시스템 설계)

  • Lee, Chang-Bok;No, Si-Yong;Park, Deok-Gyu;Park, Sang-Jun;Lee, Jong-Chan;Park, Ki-Hong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.385-390
    • /
    • 2009
  • 본 연구에서는 최근 학교 주변에서 발생하는 어린이 범죄 사고의 관리 및 예방을 위한 무선 센서 네트워크 기반의 스쿨존 안전관리 시스템을 제안한다. 학교 주변 무선센서네트워크 망 구축과 어린이들에게 부착되는 센서들을 통해 환경 및 위치 영상 센싱 정보들을 공간 지식화하여 안전과 관련된 서비스를 제공한다. 또한 스쿨존 망을 벗어나 통신이 되지 않는 어린이의 경우 기회주의적 네트워크를 통하여 관리할 수 있는 전략적 안전관리 방안을 제안한다.

  • PDF

The Optimum Configuration of Vehicle Parking Guide System based on Ad Hoc Wireless Sensor Network

  • Lim, Myoung-Seob;Xu, Yihu;Lee, Chung-Hoon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.3
    • /
    • pp.199-203
    • /
    • 2011
  • The wireless sensor network (WSN) based on ad hoc network is applied to vehicle parking guide system without parking guide man at area or building with large scale of parking lots. The optimum number of cluster heads was derived for getting the minimum power consumption as well as time delay. Through the theoretical analysis of power consumption and time delay with the number of cluster heads in wireless sensor network, it was found that there exists the minimum point in the variation of power consumption and time delay according to the number of cluster heads.

Security Analysis of Block Cipher MD-64 Suitable for Wireless Sensor Network Environments (무선 센서 네트워크 환경에 적합한 블록 암호 MD-64에 대한 안전성 분석)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.865-870
    • /
    • 2011
  • MD-64 is a 64-bit block cipher suitable for the efficient implementation in hardware environments such as WSN. In this paper, we propose a related-key amplified boomerang attack on the full-round MD-64. The attack on the full-round MD-64 requires $2^{45.5}$ related-key chosen plaintexts and $2^{95}$ MD-64 encryptions. This work is the first known cryptanalytic result on MD-64.

A Robust Mutual Authentication Protocol for Wireless Sensor Networks

  • Chen, Tien-Ho;Shih, Wei-Kuan
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.704-712
    • /
    • 2010
  • Authentication is an important service in wireless sensor networks (WSNs) for an unattended environment. Recently, Das proposed a hash-based authentication protocol for WSNs, which provides more security against the masquerade, stolen-verifier, replay, and guessing attacks and avoids the threat which comes with having many logged-in users with the same login-id. In this paper, we point out one security weakness of Das' protocol in mutual authentication for WSN's preservation between users, gateway-node, and sensor nodes. To remedy the problem, this paper provides a secrecy improvement over Das' protocol to ensure that a legal user can exercise a WSN in an insecure environment. Furthermore, by presenting the comparisons of security, computation and communication costs, and performances with the related protocols, the proposed protocol is shown to be suitable for higher security WSNs.

A switching-based delay optimal aggregation tree construction: An algorithm design (에이전트 시스템 개발도구에 관한 연구)

  • Nguyen, Dung T.;Yeom, Sanggil;Choo, Hyunseung
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.677-679
    • /
    • 2017
  • Data convergecast is an indispensable task for any WSN applications. Typically, scheduling in the WSN consists of two phases: tree construction and scheduling. The optimal tree structure and scheduling for the network is proven NP-hard. This paper focuses on the delay optimality while constructing the data convergecast tree. The algorithm can take any tree as the input, and by performing the switches (i.e. a node changes its parent), the expected aggregation delay is potentially reduced. Note that while constructing the tree, only the in-tree collisions between the child nodes sending data to their common parent is considered.