scholarly journals Finding Robust Assailant Using Optimization Functions (FiRAO-PG) in Wireless Sensor Network

2015 ◽  
Vol 2015 ◽  
pp. 1-7 ◽  
Author(s):  
Piyush Kumar Shukla ◽  
Sachin Goyal ◽  
Rajesh Wadhvani ◽  
M. A. Rizvi ◽  
Poonam Sharma ◽  
...  

Wireless sensor network consists of hundreds or thousands of low cost, low power, and self-organizing tiny sensor nodes that are deployed within the sensor network. Sensor network is susceptible to physical attacks due to deprived power and restricted resource capability and is exposed to external environment for transmitting and receiving data. Node capture attack is one of the most menacing attack in the wireless sensor network and may be physically captured by an adversary for extracting confidential information regarding cryptographic keys, node’s unique id, and so forth, from its memory to eliminate the confidentiality and integrity of the wireless links. Node capture attack suffers from severe security breach and tremendous network cost. We propose an empirically designed multiple objectives node capture attack algorithm based on optimization functions as an effective solution against the attacking efficiency of node capture attack. Finding robust assailant optimization-particle swarm optimization and genetic algorithm (FiRAO-PG) consists of multiple objectives: maximum node participation, maximum key participation, and minimum resource expenditure to find optimal nodes using PSO and GA. It will leverage a comprehensive tool to destroy maximum portion of the network realizing cost-effectiveness and higher attacking efficiency. The simulation results manifest that FiRAO-PG can provide higher fraction of compromised traffic than matrix algorithm (MA) so the attacking efficiency of FiRAO-PG is higher.

The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges on their security to researchers. These networks are likely to be composed of thousands of tiny sensor nodes, which are low-cost devices equipped with limited memory, processing, radio, and in many cases, without access to renewable energy resources. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. First, we propose some of the security goal for Wireless Sensor Network. To perform any task in WSN, the goal is to ensure the best possible utilization of sensor resources so that the network could be kept functional as long as possible. In contrast to this crucial objective of sensor network management, a Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of th


Author(s):  
Priyanka Ranaware ◽  
N.D. Dhoot

<p class="Default">This paper proposes a novel industrial wireless sensor network for industrial machine condition monitoring. To avoid unexpected equipment failures and obtain higher accuracy in diagnostic and prognostic for the health condition of a motor, efficient and comprehensive data collecting, monitoring, and control play an important role to improve the system more reliable and effective. A novel wireless data collection for health monitoring system of electric machine based on wireless sensor network is proposed and developed in this paper. The unique characteristics of ZigBee networks such as low power, low cost, and high flexibility make them ideal for this application. The proposed system consists of wireless sensor nodes which are organized into a monitoring network by ZigBee protocols. A base station and wireless nodes have been developed to form a prototype system. Various sensors have the capability to monitor physiological as well as environmental conditions. Therefore proposed system provides a flexible solution that makes our living spaces more intelligent.</p>


2018 ◽  
Vol 7 (3.3) ◽  
pp. 93 ◽  
Author(s):  
Santosh Anand ◽  
Akarsha RR

Energy utilization is an important aspect in any Wireless Sensor Network .The data transmission from various components connected over real-time networks consumes more energy in Wireless Sensor Network. Mainly the task of any network engineer lies in performing an energy efficient, so to reserve the nonrenewable energy supply to sensor nodes. The research convey out effective utilization of energy in wireless sensor networks. It is important to comprise long-term and low-cost monitoring in different WSN application. The network algorithms separated mainly in two parts, first to generate multiple paths and second to switch paths from generated list of paths .Which is implemented as multi-hop-communication so that the battery life of the sensor node may live for long term and low cost of monitoring, which achieve the high lifetime of WSN. 


Author(s):  
Martin Drahanský ◽  
Petr Hanáček ◽  
František Zbořil ◽  
Martin Henzl ◽  
František V. Zbořil ◽  
...  

This chapter shows how cryptomodules can increase security of wireless sensor network and possibilities of biometric authentication against a node or the whole network. For secure operation of a wireless sensor network, security objectives such as confidentiality, integrity, and authentication must be implemented. These security objectives typically employ cryptography, therefore sensor nodes should be able to compute cryptographic algorithms and provide secure tamper-resistant storage for cryptographic keys. Use of dedicated secure hardware for this purpose and security threats are discussed. Two scenarios where the biometric authentication would be appreciated are introduced – smart home and storehouse with medicaments. Biometric generation of cryptographic keys, biometric authentication in wireless network and possible attacks on biometrics are presented. When designing and verifying communication protocols using informal techniques, some security errors may remain undetected. Formal verification methods that provide a systematic way of finding protocol flaws are discussed.


2019 ◽  
Vol 16 (9) ◽  
pp. 4034-4043
Author(s):  
Rani Poonam ◽  
Sharma Avinash

Wireless Sensor Network (WSN) is an emerging area in past few decades. Through the integration of low cost sensor nodes with Internet of Things (IoT), lots of applications are common now these days. Each application senses and transmits the fused data to the sink. This wireless data transmission is called routing and is the main governing factor for the span of the sensor network. This paper analyzes and presents different variety of routing techniques based on connectivity structure of the sensors. The type of application for which sensor nodes are used governs selection of a routing technique.


2018 ◽  
Vol 7 (S1) ◽  
pp. 50-53
Author(s):  
K. Madhumathi . ◽  
T. Suresh .

Wireless Sensor Network consists of large number of autonomous, small, low cost sensor nodes that are spatially distributed in areas of investigation like disaster management, Military, environmental monitoring etc. The main purpose of using those nodes is to collect information from source and process it in destination. But the data received in the destination are useless unless the exact location of source is not known. The task of finding physical coordinates of these sensor nodes in WSNs area is known as localization. One solution for the above problem is manual configuration of sensor but it is unfeasible if the area of deployment is large or inaccessible. Therefore, we use localization techniques which help to capture the location of nodes in wireless sensor network. This study analyses localization algorithms with their pros and cons.


Sign in / Sign up

Export Citation Format

Share Document