scholarly journals Enhanced Security Protocol in Wireless Sensor Networks

Author(s):  
Trilok C. Aseri ◽  
Neha Singla

The need for security in communications is in fact not new. This need has existed in military communications for thousands of years. In this paper, we focus on network protocols that provide security services. Wireless sensor network is an emerging technology that shows applications both for public as well as military purposes. Monitoring is one of the main applications. A large amount of redundant data is generated by sensor nodes. This paper compares all the protocols which are designed for security of wireless sensor network on the basis of security services and propose an improved protocol that reduces communication overhead by removing data redundancy from the network. By using the message sequence number we can check whether it is old message or new message. If the message is old then no need to send that message thereby reducing overhead. It also integrates security by data freshness in the protocol.

2014 ◽  
Vol 587-589 ◽  
pp. 2339-2345
Author(s):  
Jia Yan Li ◽  
Jun Ping Wang

This paper proposes a new wireless sensor routing algorithm by combining the ant colony algorithm with the mobile agent technology. This algorithm considers the distance and path energy overhead among nodes and residual node energy, equalizes the energy overhead in the network, improves the update rule of the ant colony information elements and speeds up convergence of the ant colony algorithm to get the optimal values. The simulation results indicate that this algorithm can improve the globalization and convergence speed, effectively reduce redundant data transmission and communication overhead, extend the network lifecycle and be very suitable for a large-scale wireless sensor network compared to other mobile agent routing algorithms.


2015 ◽  
Vol 15 (3) ◽  
pp. 584
Author(s):  
Raja Waseem Anwar ◽  
Majid Bakhtiari ◽  
Anazida Zainal ◽  
Kashif Naseer Qureshi

Wireless sensor network is a tremendous emerging technology provides communication services for environmental monitoring and target tracking for mass public and military. With increasing of this smart network popularity sensor network faced various challenges and threats. The inclusion of wireless sensor nodes also incurs different types of security threats in network. Mostly networks are using shared key approaches to make less communication overhead, but still network compromise with replay impersonation and compromise attacks. The existing proposed schemes are not fully addressed other network resources such as energy and speed, etc.  The intent of this paper is to provide a comprehensive security requirement, detail about security attacks in network and discuss the existing security schemes.


Author(s):  
Veerabadrappa Veerabadrappa ◽  
Booma Poolan Marikannan

Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.


Author(s):  
NAYANA NAYANA ◽  
M.B. NIRMALA ◽  
A.S MANJUNATH

Wireless sensor network localization is an important area that attracts significant research interest. Current localization algorithms mainly focus to localize as many nodes as possible for a given static set of anchor nodes and distance measurement. In this paper, we discuss a new technique that aims to localize all the sensor nodes in the network using trilateration with greedy technique, and a security protocol is used for providing confidentiality and authentication between anchor nodes and sensor nodes.


2013 ◽  
Vol 9 (2) ◽  
pp. 1063-1067
Author(s):  
Manju Vc ◽  
Dr.Sasi Kumar.

A wireless sensor network is a wireless network organized with a large number of sensor nodes with specialized sensors that can monitor various physical attributes such as temperature, pressure, vibration, and sound. Sensor nodes are powered up with batteries. Due to unattended nature of the deployment, the sensor nodes’ batteries cannot be recharged. In such conditions, the nodes must optimally consume power. Various protocols are designed to reduce the energy consumption of sensor nodes by keeping the antenna in sleep mode 90% of time, so that power is saved. MAC protocols are designed to adaptively vary the sleep time based on the communication need. But attackers use their knowledge of their underlying MAC protocol, to reduce the sleep time for the node, so that the lifetime of a node reduces. This problem is popularly known as Denial of sleep attack. In this paper, we propose an effective solution }to defend against such attacks in  a sensor network. Our proposed solution introduces communication overhead only when the attack is suspected and also the defending mechanism is triggered only in the area of attack. Also the analysis shows that our solution is very strong against SYNC replay attack and jamming attacks.


Author(s):  
Chao Wang

Background: It is important to improve the quality of service by using congestion detection technology to find the potential congestion as early as possible in wireless sensor network. Methods: So an improved congestion control scheme based on traffic assignment and reassignment algorithm is proposed for congestion avoidance, detection and mitigation. The congestion area of the network is detected by predicting and setting threshold. When the congestion occurs, sensor nodes can be recovery quickly from congestion by adopting reasonable method of traffic reassignment. And the method can ensure the data in the congestion areas can be transferred to noncongestion areas as soon as possible. Results: The simulation results indicate that the proposed scheme can reduce the number of loss packets, improve the throughput, stabilize the average transmission rate of source node and reduce the end-to-end delay. Conclusion: : So the proposed scheme can enhance the overall performance of the network. Keywords: wireless sensor network; congestion control; congestion detection; congestion mitigation; traffic assignment; traffic reassignment.


2018 ◽  
Vol 14 (01) ◽  
pp. 4
Author(s):  
Wang Weidong

To improve the efficiency of the remote monitoring system for logistics transportation, we proposed a remote monitoring system based on wireless sensor network and GPRS communication. The system can collect information from the wireless sensor network and transmit the information to the ZigBee interpreter. The monitoring system mainly includes the following parts: Car terminal, GPRS transmission network and monitoring center. Car terminal mainly consists by the Zigbee microcontroller and peripherals, wireless sensor nodes, RFID reader, GPRS wireless communication module composed of a micro-wireless monitoring network. The information collected by the sensor communicates through the GPRS and the monitoring center on the network coordinator, sends the collected information to the monitoring center, and the monitoring center realizes the information of the logistics vehicle in real time. The system has high applicability, meets the design requirements in the real-time acquisition and information transmission of the information of the logistics transport vehicles and goods, and realizes the function of remote monitoring.


Author(s):  
Edison Pignaton de Freitas ◽  
Tales Heimfarth ◽  
Ivayr Farah Netto ◽  
Carlos Eduardo Pereira ◽  
Armando Morado Ferreira ◽  
...  

2014 ◽  
Vol 701-702 ◽  
pp. 1025-1028
Author(s):  
Yu Zhu Liang ◽  
Meng Jiao Wang ◽  
Yong Zhen Li

Clustering the sensor nodes and choosing the way for routing the data are two key elements that would affect the performance of a wireless sensor network (WSN). In this paper, a novel clustering method is proposed and a simple two-hop routing model is adopted for optimizing the network layer of the WSN. New protocol is characterized by simplicity and efficiency (SE). During the clustering stage, no information needs to be shared among the nodes and the position information is not required. Through adjustment of two parameters in SE, the network on any scale (varies from the area and the number of nodes) could obtain decent performance. This work also puts forward a new standard for the evaluation of the network performance—the uniformity of the nodes' death—which is a complement to merely taking the system lifetime into consideration. The combination of these two aspects provides a more comprehensive guideline for designing the clustering or routing protocols in WSN.


2011 ◽  
Vol 57 (3) ◽  
pp. 341-346 ◽  
Author(s):  
Safdar Khan ◽  
Boubaker Daachi ◽  
Karim Djouani

Overcoming Localization Errors due to Node Power Drooping in a Wireless Sensor NetworkReceived Signal Strength Indication (RSSI) plays a vital role in the range-free localization of sensor nodes in a wireless sensor network and a good amount of research has been made in this regard. One important factor is the battery voltage of the nodes (i.e., the MICAz sensors) which is not taken into account in the existing literature. As battery voltage level performs an indispensable role for the position estimation of sensor nodes through anchor nodes therefore, in this paper, we take into a account this crucial factor and propose an algorithm that overcomes the problem of decaying battery. We show the results, in terms of more precise localization of sensor nodes through simulation. This work is an extension to [1] and now we also use neural network to overcome the localization errors generated due to gradual battery voltage drooping.


Sign in / Sign up

Export Citation Format

Share Document