Cluster communication protocol for wireless sensor networks

2016 ◽  
Vol 20 (2) ◽  
pp. 84 ◽  
Author(s):  
Faruk Bagci ◽  
N.A. Ala' ◽  
N.A. Khalifeh
2013 ◽  
Vol 427-429 ◽  
pp. 1268-1271
Author(s):  
Xue Wen He ◽  
Ying Fei Sheng ◽  
Kuan Gang Fan ◽  
Le Ping Zheng ◽  
Qing Mei Cao

In view of the existing flaws of traditional manual observations, a new type of tailing reservoir safety monitoring and warning system based on ZigBee and LabVIEW was designed. The system chose SoC chip CC2530 as the RF transceiver and designed the low-power wireless sensor networks nodes to collect and process the data of tailing reservoir. It chose ZigBee 2007 as the network communication protocol, and uploaded the data to PC by RS232 serial port. The monitoring and warning interface of PC was completed with LabVIEW. The testing results show that the data transmission of the network is stable and the system is suitable for real-time monitoring and warning of the tungsten tailing reservoir.


Author(s):  
Murat Al ◽  
Kenji Yoshigoe

Understanding data security is crucial to the daily operation of Wireless Sensor Networks (WSNs) as well as to the further advancement of security solutions in the research community. Unlike many surveys in literature that handle the topic in close relationship to a particular communication protocol, we provide a general view of vulnerabilities, attacks, and countermeasures in WSNs, enabling a broader audience to benefit from the presented material. We compare salient characteristics and applications of common wireless technologies to those of WSNs. As the main focus of the chapter, we thoroughly describe the characteristics of attacks and their countermeasures in WSNs. In addition, we qualitatively illustrate the multi-dimensional relationship among various properties including the effectiveness of these attacks (i.e., caused damage), the resources needed by adversaries to accomplish their intended attacks (i.e., consumed energy and time), and the resources required to defend against these attacks (i.e., energy overhead).


Author(s):  
Alekha Kumar Mishra

Most of the applications of wireless sensor networks have critical tasks to be fulfilled; thus they must be secured. Recent studies focus on securing the communication between sensors and with the base station. An adversary can launch various types of attack on WSN depending on its ability and objective. These attacks can be broadly classified into two categories: 1) layer-dependent, and 2) layer-independent. Layer-dependent attacks are specific to communication protocol layers. They mostly target a node's functionality such as routing, availability, time synchronization, and data aggregation. Layer-independent attacks are not restricted to any communication protocol layers. These attacks can be launched independent of the communication protocol stack. In this chapter, we study the various attacks possessed by WSN and classify them based on their strength, action, security requirements and impact at different layers of WSN. We define metrics to evaluate the characteristic, behavior, and dependency of these attacks followed a discussion on various counter-measures to defend them.


2014 ◽  
Vol 687-691 ◽  
pp. 3679-3685
Author(s):  
Jian Wang ◽  
Xiao Ming Hu ◽  
Yin Chun Yang ◽  
Xiu Mei Wu

Wireless sensor networks are widely deployed and thus are suffering increasing threats such as reactive bit jamming attacks. Such jamming can be alleviated by coded transmissions. This paper derives an optimal redundancy level required for Reed-Solomon code based transmissions and unveils the monotonic characteristic of coded transmission efficiency with respect to frame size, jamming strength, as well as communication protocol stack overhead.


Sign in / Sign up

Export Citation Format

Share Document