scholarly journals Security of Wireless Sensor Nodes

2020 ◽  
pp. 1773-1780
Author(s):  
Alya'a Abdulrazzak Msekh ◽  
Jamal Mohamed Kadhim

Due to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive datafrom illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, we propose a design of a new sensor node for tracking the location of cars and collecting all information and all visited locations by cars, followed byencryption in a sensor node and saving in the database. A microcontroller of Arduino esp8266 Node MCU board and a GPS module are used. The cryptography uses the chaos-based symmetric-key encryption technique for data. This scheme utilizes a chaotic map (Hénon map) for robustness and security of data. The key sensitivity can be performed by statistical experiments to determine the safety, reliability, and speed of the algorithm. The proposed algorithm presents several exciting features, such as a high level of security, sufficient saving of the energy of the sensor network, and an acceptable encryption speed compared to Advanced Encryption Standard (AES) and Data Encryption Standard (DES).

2020 ◽  
Vol 26 (3) ◽  
pp. 39-42
Author(s):  
Mihaela Anamaria Bostan-Pop ◽  
Romana Oancea

AbstractConsidering that the level of cyber threats is constantly increasing, a necessary demand emerges from organizations and corporations worldwide to protect their networks against possible cyber-attacks. In the future all malicious actions that occur in cyberspace will continue to alter the way we approach the security of an entire network. The article presents the most stringent need concerning the technical specialization of future officers, highlighting the knowledge entailed in order to better understand the complexity of a mission that takes place in virtual space. Undoubtedly, modern battlefield incorporates a virtual component where nearly all weapons systems rely upon information and communication technologies in order to connect and achieve operational level. The demand for future cyber defence specialists in the military domain reached a high level all over the world, and there will be a challenging process to be able to create a highly skilled workforce to fight against a large scale of malicious activities that have impact upon the national security system.


Cloud Computing has made it possible to provide individuals as well as organizations with a utility that is costeffective. It empowers businesses by delivering these services using the internet. Files can be shared through the cloud. These files may contain sensitive information that needs to be kept hidden from anonymous users. This is done using cryptographic algorithms. High level of security can be provided using hybrid cryptography to encrypt the data. Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES) are the symmetric key encryption algorithms used to secure. An asymmetric key encryption algorithm, Rivest-Shamir-Adleman (RSA) helps in providing a hybrid cryptography model. The security of the key generated can be further enhanced using image steganography method Least Significant Bit (LSB). These issues regarding the security and its challenges will be addressed in this paper and also analyse the measures to handle it.


Information ◽  
2020 ◽  
Vol 11 (11) ◽  
pp. 524
Author(s):  
Joseph Habiyaremye ◽  
Marco Zennaro ◽  
Chomora Mikeka ◽  
Emmanuel Masabo ◽  
Santhi Kumaran ◽  
...  

Nowadays with the evolution of Internet of Things (IoT), building a network of sensors for measuring data from remote locations requires a good plan considering a lot of parameters including power consumption. A Lot of communication technologies such as WIFI, Bluetooth, Zigbee, Lora, Sigfox, and GSM/GPRS are being used based on the application and this application will have some requirements such as communication range, power consumption, and detail about data to be transmitted. In some places, especially the hilly area like Rwanda and where GSM connectivity is already covered, GSM/GPRS may be the best choice for IoT applications. Energy consumption is a big challenge in sensor nodes which are specially supplied by batteries as the lifetime of the node and network depends on the state of charge of the battery. In this paper, we are focusing on static sensor nodes communicating using the GPRS protocol. We acquired current consumption for the sensor node in different locations with their corresponding received signal quality and we tried to experimentally find a mathematical data-driven model for estimating the GSM/GPRS sensor node battery lifetime using the received signal strength indicator (RSSI). This research outcome will help to predict GPRS sensor node life, replacement intervals, and dynamic handover which will in turn provide uninterrupted data service. This model can be deployed in various remote WSN and IoT based applications like forests, volcano, etc. Our research has shown convincing results like when there is a reduction of −30 dBm in RSSI, the current consumption of the radio unit of the node will double.


Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4293
Author(s):  
Junhai Luo ◽  
Yang Yang ◽  
Zhiyan Wang ◽  
Yanping Chen ◽  
Man Wu

As one of the important facilities for marine exploration, as well as environment monitoring, access control, and security, underwater wireless sensor networks (UWSNs) are widely used in related military and civil fields, since the sensor node localization is the basis of UWSNs’ application in various related fields. Therefore, the research of localization algorithms based on UWSNs has gradually become one of the research hotspots today. However, unlike terrestrial wireless sensor networks (WSNs), many terrestrial monitoring and localization technologies cannot be directly applied to the underwater environment. Moreover, due to the complexity and particularity of the underwater environment, the localization of underwater sensor nodes still faces challenges, such as the localization ratio of sensor nodes, time synchronization, localization accuracy, and the mobility of nodes. In this paper, we propose a mobility-assisted localization scheme with time synchronization-free feature (MALS-TSF) for three-dimensional (3D) large-scale UWSNs. In addition, the underwater drift of the sensor node is considered in this scheme. The localization scheme can be divided into two phases. In Phase I, anchor nodes are distributed in the monitoring area, reducing the monitoring cost. Then, we address a time-synchronization-free localization scheme, to obtain the coordinates of the unknown sensor nodes. In Phase II, we use the method of two-way TOA to locate the remaining ordinary sensor nodes. The simulation results show that MALS-TSF can achieve a relatively high localization ratio without time synchronization.


Author(s):  
Damiano Milani ◽  
Marco Bassetti ◽  
Francesco Braghin ◽  
Gisella Tomasini

Sensor nodes are innovative devices that can perform measurements on a large scale and communicate over a network. One of the most significant problems regarding the sensor nodes is how to supply power to a large number of devices. For this reason, they greatly benefit from energy harvesting techniques which can provide energy recovered directly from the environment. A study of the design and the modeling of an autonomous sensor node, powered by a vibrational piezoelectric harvester, is reported here. Subject of the first part of the analysis is a piezoelectric bimorph: an analytical model is proposed in order to estimate the performance, giving particular attention to the optimal mechanical and electrical parameters. The model is then validated through experimental tests, assuming different kinds of real scenarios. Then the results are used to design a device that can benefit from this harvester. In particular a wireless sensor node is developed, for which the energy scavenging ensures energy autonomy and long-term operability. Thanks to a particular harvesting circuit and opportune algorithms for energy management, this system is able to extract energy from vibrations and store it into capacitors. The embedded accelerometer and a wireless module make this device ideal for Structure Health Monitoring purposes.


2021 ◽  
Author(s):  
Philipp Bolte ◽  
Ulf Witkowski ◽  
Rolf Morgenstern

In agriculture, it becomes more and more important to have detailed data, e.g. about weather and soil quality, not only in large scale classic crop farming applications but also for urban agriculture. This paper proposes a modular wireless sensor node that can be used in a centralized data acquisition scenario. A centralized approach, in this case multiple sensor nodes and a single gateway or a set of gateways, can be easily installed even without local infrastructure as mains supply. The sensor node integrates a LoRaWAN radio module that allows long-range wireless data transmission and low-power battery operation for several months at reasonable module costs. The developed wireless sensor node is an open system with focus on easy adaption to new sensors and applications. The proposed system is evaluated in terms of transmission range, battery runtime and sensor data accuracy.


Author(s):  
Georgi Derluguian

The author develops ideas about the origin of social inequality during the evolution of human societies and reflects on the possibilities of its overcoming. What makes human beings different from other primates is a high level of egalitarianism and altruism, which contributed to more successful adaptability of human collectives at early stages of the development of society. The transition to agriculture, coupled with substantially increasing population density, was marked by the emergence and institutionalisation of social inequality based on the inequality of tangible assets and symbolic wealth. Then, new institutions of warfare came into existence, and they were aimed at conquering and enslaving the neighbours engaged in productive labour. While exercising control over nature, people also established and strengthened their power over other people. Chiefdom as a new type of polity came into being. Elementary forms of power (political, economic and ideological) served as a basis for the formation of early states. The societies in those states were characterised by social inequality and cruelties, including slavery, mass violence and numerous victims. Nowadays, the old elementary forms of power that are inherent in personalistic chiefdom are still functioning along with modern institutions of public and private bureaucracy. This constitutes the key contradiction of our time, which is the juxtaposition of individual despotic power and public infrastructural one. However, society is evolving towards an ever more efficient combination of social initiatives with the sustainability and viability of large-scale organisations.


2020 ◽  
pp. 75-117
Author(s):  
A.N. Shvetsov

The article compares the processes of dissemination of modern information and communication technologies in government bodies in Russia and abroad. It is stated that Russia began the transition to «electronic government» later than the developed countries, in which this process was launched within the framework of large-scale and comprehensive programs for reforming public administration in the 1980s and 1990s. However, to date, there is an alignment in the pace and content of digitalization tasks. At a new stage in this process, the concept of «electronic government» under the influence of such newest phenomena of the emerging information society as methods of analysis of «big data», «artificial intelligence», «Internet of things», «blockchain» is being transformed into the category of «digital government». Achievements and prospects of public administration digitalization are considered on the example of countries with the highest ratings — Denmark, Australia, Republic of Korea, Great Britain, USA and Russia.


Author(s):  
Abdelhady M. Naguib ◽  
Shahzad Ali

Background: Many applications of Wireless Sensor Networks (WSNs) require awareness of sensor node’s location but not every sensor node can be equipped with a GPS receiver for localization, due to cost and energy constraints especially for large-scale networks. For localization, many algorithms have been proposed to enable a sensor node to be able to determine its location by utilizing a small number of special nodes called anchors that are equipped with GPS receivers. In recent years a promising method that significantly reduces the cost is to replace the set of statically deployed GPS anchors with one mobile anchor node equipped with a GPS unit that moves to cover the entire network. Objectives: This paper proposes a novel static path planning mechanism that enables a single anchor node to follow a predefined static path while periodically broadcasting its current location coordinates to the nearby sensors. This new path type is called SQUARE_SPIRAL and it is specifically designed to reduce the collinearity during localization. Results: Simulation results show that the performance of SQUARE_SPIRAL mechanism is better than other static path planning methods with respect to multiple performance metrics. Conclusion: This work includes an extensive comparative study of the existing static path planning methods then presents a comparison of the proposed mechanism with existing solutions by doing extensive simulations in NS-2.


Author(s):  
Yang Wang ◽  
Feifan Wang ◽  
Yujun Zhu ◽  
Yiyang Liu ◽  
Chuanxin Zhao

AbstractIn wireless rechargeable sensor network, the deployment of charger node directly affects the overall charging utility of sensor network. Aiming at this problem, this paper abstracts the charger deployment problem as a multi-objective optimization problem that maximizes the received power of sensor nodes and minimizes the number of charger nodes. First, a network model that maximizes the sensor node received power and minimizes the number of charger nodes is constructed. Second, an improved cuckoo search (ICS) algorithm is proposed. This algorithm is based on the traditional cuckoo search algorithm (CS) to redefine its step factor, and then use the mutation factor to change the nesting position of the host bird to update the bird’s nest position, and then use ICS to find the ones that maximize the received power of the sensor node and minimize the number of charger nodes optimal solution. Compared with the traditional cuckoo search algorithm and multi-objective particle swarm optimization algorithm, the simulation results show that the algorithm can effectively increase the receiving power of sensor nodes, reduce the number of charger nodes and find the optimal solution to meet the conditions, so as to maximize the network charging utility.


Sign in / Sign up

Export Citation Format

Share Document