The double-edged sword: Revealing the critical role of structural hole in forming trust for securing Wireless sensor networks

Author(s):  
Ming Xiang ◽  
William Liu ◽  
Quan Bai ◽  
Adnan Al-Anbuky
Author(s):  
Ming Xiang ◽  
William Liu ◽  
Quan Bai ◽  
Adnan Al-Anbuky

The security issues in wireless sensor networks (WSNs) are crucial and the limitation of computing resources and distributed properties of WSN make the traditional security mechanisms no longer feasible in protecting WSN as in the wired networks. There is an emerging research area i.e., trust and reputation mechanisms, has been developed, as an alternative solution to tackle the security issues in WSNs. While the recent studies on trust are mainly focusing on the trust modelling so as to effectively detect and avoid malicious activities. In this paper, we propose to use adaptive network approach to investigate the interplay between the network entities' trust behaviour and their underlying topological connectivity. We have found that the structural hole has its unique position and efficiency on connecting different regional sub-networks, but on the other side, from the security perspective, it has risks of fragile in the network. The extensive simulation studies have confirmed that structure hole plays a critical role on both for securing WSNs and also enable network routing efficiency.


Author(s):  
Deepti Rani ◽  
Anju Sangwan ◽  
Anupma Sangwan ◽  
Tajinder Singh

With the enormous growth of sensor networks, information seeking from such networks has become an invaluable source of knowledge for various organizations to enhance the comprehension of people interests. Not only wireless sensor networks (WSNs) but its various classes also remain the hot topics of research. In this chapter, the primary focus is to understand the concept of sensor network in underwater scenario. Various mechanisms are used to recognize the activities underwater using sensor which examines the real-time events. With these features, a few challenges are also associated with sensor networks, which are addressed here. Machine learning (ML) techniques are the perfect key of success to resolve such issues due to their feasibility and adaption in complex problem environment. Therefore, various ML techniques have been explained to enhance the operational performance of WSNs, especially in underwater WSNs (UWSNs). The main objective of this chapter is to understand the concepts of UWSNs and role of ML to address the performance issues of UWSNs.


Author(s):  
Sanjay Kumar ◽  
Binod Kumar Singh ◽  
Akshita ◽  
Sonika Pundir ◽  
Rashi Joshi ◽  
...  

Abstract: WSN has been exhilarated in many application areas such as military, medical, environment, etc. Due to the rapid increase in applications, it causes proportionality to security threats. Mostly, nodes used, are independent of human reach and dependent on their limited resources, the major challenges can be framed as energy consumption and resource reliability. Introduction: Due to the limitation of resources in the sensor nodes, the traditionally intensive security mechanism is not feasible for WSNs. This limitation brought the concept of Digital watermarking in existence. The intent of this paper is to investigate the security related issues and role of watermarking in wireless sensor networks. Watermarking is an effective way to provide security, integrity, data aggregation and robustness in WSN. Mehtod: Digital watermarking is essential in WSN since it provides security in various forms such as confidentiality, service availability and data freshness. We have briefly discussed the various security requirements in the wireless sensor networks. Several issues and challenges, as well as the various threats of WMSN, is also considered. The related work, suggests that lots of research work are required to improve the security and authentication issues of WMSN by digital watermarking. This survey contribution will be helpful for researcher to accomplish effective watermarking scheme for WSN. Result: WSN is the collection of sensors that are spread in the environment. They measure and monitor physical conditions like temperature, sound, pressure, humidity, etc. and organize the collected data at the main location. The base station then forwards the data to end-users who analyze and make strategic decisions. Nowadays the modern network is bi-directional i.e. we can control the activity of the sensor. The central stations, unlike another sensor network, have infinite power, plenty of memory, powerful processors and a high bandwidth link. Whereas sensors are small in size, have fewer computation abilities, transfer wirelessly and are power-driven by small batteries Conclusion: Watermarking is an effective way to provide security, integrity, data aggregation and robustness in WSN. Digital watermarking is essential in WSN since it provides security in various forms such as confidentiality, data integrity, service availability and data freshness. In this paper, we have briefly discussed the various security requirements in the wireless sensor networks. We have also discussed work done by several authors in WSN with watermarking techniques Discussion: Wireless network faces more challenges as compared to wired network. In WSN, maximum amount of data and information can be stealed and effortlessly accessed during transmission. The nodes in a wireless sensor network (WSN) are resources constrained. Due to which WSNs have certain challenges i.e. processing power, storage and computational capacity and high bandwidth demand. Security schemes are not easy to design since the network tends to be large and ad-hoc. The analysis for privacy and security have been explored by some authors like J. Zhu et al. In recent years, a cryptography-based security designs have been proposed for WSNs. Cryptography is the process of concealing the information into the cipher text by encrypting it.


Author(s):  
Afshin Behzadan ◽  
Alagan Anpalagan

While wireless sensor networking plays a critical role in many important applications, it also contributes to the energy footprint - which continues to increase with the proliferation of wireless devices and networks worldwide. Energy-efficiency becomes a major concern in the development of next generation sensor systems and networks. This chapter discusses data management techniques from energy efficiency point of view for green wireless sensor networks.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3576
Author(s):  
Vaibhav Kotiyal ◽  
Abhilash Singh ◽  
Sandeep Sharma ◽  
Jaiprakash Nagar ◽  
Cheng-Chi Lee

Node localisation plays a critical role in setting up Wireless Sensor Networks (WSNs). A sensor in WSNs senses, processes and transmits the sensed information simultaneously. Along with the sensed information, it is crucial to have the positional information associated with the information source. A promising method to localise these randomly deployed sensors is to use bio-inspired meta-heuristic algorithms. In this way, a node localisation problem is converted to an optimisation problem. Afterwards, the optimisation problem is solved for an optimal solution by minimising the errors. Various bio-inspired algorithms, including the conventional Cuckoo Search (CS) and modified CS algorithm, have already been explored. However, these algorithms demand a predetermined number of iterations to reach the optimal solution, even when not required. In this way, they unnecessarily exploit the limited resources of the sensors resulting in a slow search process. This paper proposes an Enhanced Cuckoo Search (ECS) algorithm to minimise the Average Localisation Error (ALE) and the time taken to localise an unknown node. In this algorithm, we have implemented an Early Stopping (ES) mechanism, which improves the search process significantly by exiting the search loop whenever the optimal solution is reached. Further, we have evaluated the ECS algorithm and compared it with the modified CS algorithm. While doing so, note that the proposed algorithm localised all the localisable nodes in the network with an ALE of 0.5–0.8 m. In addition, the proposed algorithm also shows an 80% decrease in the average time taken to localise all the localisable nodes. Consequently, the performance of the proposed ECS algorithm makes it desirable to implement in practical scenarios for node localisation.


Author(s):  
Sunita Gupta ◽  
Sakar Gupta

Internet of things (IoT) is a network of connected devices that work together and exchange information. In IoT, things or devices means any object with its own IP address that is able to connect to a network and can send and receive using internet. Examples of IoT devices are computers, laptops, smart phones, and objects that are operational with chips to collect and correspond data over a network. The range of internet of things devices is huge. Consumers use smart phones to correspond with IoT devices.


Author(s):  
Ahsan Adeel ◽  
Mandar Gogate ◽  
Saadullah Farooq ◽  
Cosimo Ieracitano ◽  
Kia Dashtipour ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document