scholarly journals PHYSICAL LAYER SECURITY OF WIRELESS SENSOR NETWORK BASED ON OPPORTUNISTIC SCHEDULING

2020 ◽  
Vol 19 (1) ◽  
pp. 001
Author(s):  
Ivica Marjanović ◽  
Dejan Milić ◽  
Jelena Anastasov ◽  
Aleksandra Cvetković

In this paper, a physical layer security analysis of wireless sensor network in the presence of an attacker, employing opportunistic scheduling approach, is presented. The intended as well as unintended transmission paths experience the Weibull fading. A novel analytical expression for the intercept probability is derived. In order to emphasize the advantages of the opportunistic scheduling approach, a comparative analysis with round-robin and optimal scheduling schemes is also given. The impact of a number of active sensors and the impact of fading channel conditions over main and wiretap channels on the intercept probabilities is obtained. The accuracy of theoretical results is confirmed by independent Monte Carlo simulation results.

2017 ◽  
Vol 13 (07) ◽  
pp. 57
Author(s):  
Min Wang

<span style="font-family: 'Times New Roman',serif; font-size: 10pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">For exploring wireless sensor network - a self-organized network, a new node location algorithm based on statistical uncorrelated vector (SUV) model, namely SUV location algorithm, is proposed. The algorithm, by translating the node coordinate, simplifies the solution to double center coordinate matrix, and gets the coordinate inner product matrix; then it uses statistical uncorrelated vectors to reconstruct the coordinates of the inner product matrix and remove the correlation of inner matrix of coordinates caused by the ranging error, so as to reduce the impact of ranging error on subsequent positioning accuracy. The experimental results show that the proposed algorithm does not consider the network traffic, bust still has good performance in localization. At last, it is concluded that reducing the amount of communication of sensor nodes is beneficial to prolong the service life of the sensor nodes, thus increasing the lifetime of the whole network.</span>


2018 ◽  
Vol 14 (06) ◽  
pp. 151
Author(s):  
Shuang Xu ◽  
Tong Zhou

<p class="0abstract"><span lang="EN-US">In order to study the intelligent buildings, the intelligent building network security of wireless sensor was explored. Because of its advantages of low cost, easy installation, low maintenance and update cost, wireless sensor network system was applied to intelligent building. In view of the characteristics of various influencing factors on the wireless sensor network working environment, node hardware cost and location accuracy, a secure localization algorithm based on DV-Hop was put forward. The security analysis results showed that the algorithm resisted external attacks and guaranteed the accuracy of location results. Based on the above findings, it is concluded that the algorithm can be used to protect the safety of wireless sensor network in building. </span></p>


2012 ◽  
Vol 220-223 ◽  
pp. 1871-1876
Author(s):  
Feng Mei Liang ◽  
Bin Liu

Due to energy restrictions, node distribution density and hardware computing power etc., the traditional time synchronization mechanism is not suitable for wireless sensor network. The paper discussed the main reason that caused asynchronization and proposed an improved time synchronization algorithm based on cross layer optimization for wireless sensor network. Considering the stability of crystal oscillation and the linearity of crystal deviation in the physical layer, the improved time synchronization mechanism implemented a self-correction by the cross-layer MAC protocol. Estimating the crystal oscillation drift, the crystal deviation had been self-corrected just by a few times data broadcast. The experiment on the MCU Si1000 physical layer platform has demonstrated the practicability of the algorithm. The synchronization algorithm is able to keep a stable network operation in the way of extending the synchronization period and reducing the synchronization cost. The synchronization mechanism is applicable to the active acquisition network, especially the realtime one.


In recent years, wireless sensor network (WSN) is the measure concern over network communication. A number of attacks are occurred at the time of network communication as result it hampers the smooth functionality, data flow and data transmission. In this article, we have proposed a trust-based intrusion detection system for physical layers attacks using DRI and Cross Check method. The HTBIDS is effective method to identify the abnormal nodes in wireless sensor network. The abnormal nodes are attacked by periodic jamming attack. We have considered the periodic jamming attack at physical layer for performance evaluation. Results show that HTBIDS performs better using detection accuracy (DA) and false alarm rate (FAR).


Sign in / Sign up

Export Citation Format

Share Document