scholarly journals Node Density Based Security Level Determining to Prolong the Lifetime of WSN through Network Conditions

A wireless sensor network (WSN) consists of sensor nodes with low cost and limited performance. The energy needed for node management is important because it is difficult to manage the deployed nodes. Several traditional security protocols prevent several known attacks in WSNs, such as s false report injection attack. However, the traditional protocols do not consider the false traffic ratio and geographical environment factors. Therefore, to extend the network lifetime, a new design is needed that maintains security and considers environmental factors. This paper introduces a method to increase the energy efficiency and increase the detection rate of false reports by adjusting the security strength of the report generated at the node according to the node density and geographical location. The proposed method has the advantage that it can be applied to various security protocols based on Message Authentication Code (MAC).

Sensors ◽  
2020 ◽  
Vol 20 (19) ◽  
pp. 5719
Author(s):  
Shimaa A. Abdel Hakeem ◽  
Mohamed A. Abd El-Gawad ◽  
HyungWon Kim

Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based on the Elliptic Curve Digital Signature Algorithm (ECDSA)—are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost of excessive communication and computation overhead, which motivates us to propose a light-weight message authentication and privacy preservation protocol for V2X communications. The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (MAC). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. We constructed real V2X networks using commercial V2X devices that run our implemented protocol. Our extensive experiments with real networks demonstrate that the proposed protocol reduces the communication overhead by 6 times and computation overhead by more than 100 times compared with the IEEE1609.2 standard. Moreover, the proposed protocol reduces the communication overhead by 4 times and the computation overhead by up to 100 times compared with a non-standard security protocol, TESLA. The proposed protocol substantially reduces the average end-to-end delay to 2.5 ms, which is a 24- and 28-fold reduction, respectively, compared with the IEEE1609 and TESLA protocols.


Author(s):  
Vinod Kumar

Data sensing and collection over vast coverage areas form an integral part of IoT applications such as Smart Farming. Selection of adequate IoT connectivity technologies is an important step in the design process. Overall energy efficiency, availability of low-cost and long-life sensor nodes and achievability of long coverage range of the fixed infrastructure are the main criteria of selection. After a brief description of the scenario of connectivity technologies, this article demonstrates the usefulness of a Low Power Wide Area Networking technology named SigFox for the applications mentioned above. Performance figures in terms of coverage range and protocol throughput (manageable IoT node density) justify this claim.


2020 ◽  
Vol 10 (19) ◽  
pp. 6668
Author(s):  
Laura García ◽  
Lorena Parra ◽  
Jose M. Jimenez ◽  
Jaime Lloret ◽  
Pedro V. Mauri ◽  
...  

The increase in the world population has led to new needs for food. Precision Agriculture (PA) is one of the focuses of these policies to optimize the crops and facilitate crop management using technology. Drones have been gaining popularity in PA to perform remote sensing activities such as photo and video capture as well as other activities such as fertilization or scaring animals. These drones could be used as a mobile gateway as well, benefiting from its already designed flight plan. In this paper, we evaluate the adequacy of remote sensing drones to perform gateway functionalities, providing a guide for choosing the best drone parameters for successful WiFi data transmission between sensor nodes and the gateway in PA systems for crop monitoring and management. The novelty of this paper compared with existing mobile gateway proposals is that we are going to test the performance of the drone that is acting as a remote sensing tool to carry a low-cost gateway node to gather the data from the nodes deployed on the field. Taking this in mind, simulations of different scenarios were performed to determine if the data can be transmitted correctly or not considering different flying parameters such as speed (from 1 to 20 m/s) and flying height (from 4 to 104 m) and wireless sensor network parameters such as node density (1 node each 60 m2 to 1 node each 5000 m2) and antenna coverage (25 to 200 m). We have calculated the time that each node remains with connectivity and the time required to send the data to estimate if the connection will be bad, good, or optimal. Results point out that for the maximum node density, there is only one combination that offers good connectivity (lowest velocity, the flying height of 24 m, and antenna with 25 m of coverage). For the other node densities, several combinations of flying height and antenna coverage allows good and optimal connectivity.


2014 ◽  
Vol 23 (09) ◽  
pp. 1450128 ◽  
Author(s):  
E. MOHANRAJ ◽  
K. DURAISWAMY ◽  
K. PRASANTH

Quality of service (QoS) and security have been considered as two competent units to govern and administer end-to-end traffic across network. A mobile ad hoc network (MANET) is a type of wireless communication, every node can act as a router or base station. Secure QoS-based routing is an important problem in MANET. A hierarchical key ranking (HKR) model is presented here for secure group communications in MANETs. To enhance the security, one-to-one random mapping is performed using hash-based message authentication code (HashMAC). Due to the dynamic nature and topological changes in MANET, group safeguarding is efficiently accomplished. For secure group communication and efficient QoS routing in MANET, a sector key (SK) is shared among group members to encrypt group messages which is obtained using secured message authenticated code (SMAC). The primary design is to include the group members in sector to vigorously contribute to the security of the multicast group, as a result dropping the communication and calculating load on the source. Experimental evaluation is done to estimate the performance of the proposed secure QoS routing and communication using hierarchical key ranking [SRHKR] in MANET in terms of delivery rate, security level, delay.


2021 ◽  
Author(s):  
Jie Xiao

The first design presents a novel location-based key management and en-route data authentication proposal. It divides the whole sensing area into a number of location cells. A group of location cells consist of a logical group. A pairwise key between two sensor nodes is established based on grid-based bivariate t-degree polynomials. Any valid reading report needs to collect enough message authentication code (MACs) from different neighbours. These pairwise keys used for generating the MAC are forwarded several hops down to the base station for future en-route data authentication. The second design proposes a greedy location-based secure and energy-efficient data aggregation approach. It further utilizes data aggregation based on the previous design by setting up control groups, applying pattern codes, selecting and switching control head nodes dynamically and periodically. In addition, different from the first design, it only requires control head nodes to collect enough MACs in each reading report. Extensive analysis, evaluations and experiments show us that both designs are secure, efficient and resilient.


2021 ◽  
Author(s):  
Jie Xiao

The first design presents a novel location-based key management and en-route data authentication proposal. It divides the whole sensing area into a number of location cells. A group of location cells consist of a logical group. A pairwise key between two sensor nodes is established based on grid-based bivariate t-degree polynomials. Any valid reading report needs to collect enough message authentication code (MACs) from different neighbours. These pairwise keys used for generating the MAC are forwarded several hops down to the base station for future en-route data authentication. The second design proposes a greedy location-based secure and energy-efficient data aggregation approach. It further utilizes data aggregation based on the previous design by setting up control groups, applying pattern codes, selecting and switching control head nodes dynamically and periodically. In addition, different from the first design, it only requires control head nodes to collect enough MACs in each reading report. Extensive analysis, evaluations and experiments show us that both designs are secure, efficient and resilient.


The sensor nodes of a wireless sensor networks (WSNs) are difficult to replace when they fails after deployment. Sensor nodes are small and low-cost due to limited resources and are vulnerable to several types of application attacks. To solve this problem, many security protocols have been meticulously researched considering the energy efficiency and network attacks. The statistical en-route filtering (SEF) scheme has been proposed to detect bogus data and false report injection attacks that reduce network life. SEF performs early filtering of modulated data using the en-route technique. Deployed nodes transmit a report to the sink node through hop-by-hop communication, and as a result nodes close to the sink node have a relatively high burden. Although many studies have been proposed to improve the energy efficiency of each node based on the SEF scheme, these studies are not considered the Burden of the cluster. A cluster with a high burden exhausts the node energy faster than another cluster with low burden. If a cluster in the upper stream is depleted, it will not be able to receive reports from many regions in the lower stream. Therefore, the SEF should be used to determine proper routing while considering the node density to increase the lifetime of the network. In this paper, we propose a method to control the load balancing of nodes considering the burden ratio and density of nodes. The cluster head node controls the route path using additional cluster information in the proposed scheme. The experimental results show that the proposed scheme prolongs the network lifetime efficiency by 35.645% compared to the existing scheme


Author(s):  
Ivars Orehovs

In a literary heritage with a developed tradition of genres, works whose main purpose is to attract the attention of readers to a selected geographical location, are of particular culture-historical and culture-geographical interest. The most widespread in this respect is travel literature, which is usually written by travellers and consist of impressions portrayed in prose after visits to foreign lands. Another type of literary depiction with an expressed poetic orientation, but a similar goal, is characteristic of dedicatory poetry. The author’s position is usually saturated with emotional expressiveness as well as the artistry of symbols, encouraging the reader or listener to feel the formation of a spontaneous attitude. It is possible to gain confidence in the engagement of the author of the poetry as an individual in the depicted cultural-geographical environment, which can be conceptually expressed by words or pairs of words ‘resident’, ‘native place’, ‘patriot’. With regard to the devotional depictions on the Latvian urban environment, one of the earliest examples known in the history of literature is the dedicatory poem in German by Christian Bornmann to the town Jelgava with its ancient name (Mitau, 1686/1802). The name of Liepāja town in this tradition of the genre has become an embodiment later – in the poetry selection in German, also using the ancient name of the town (Libausche Dichtungen, 1853), but in terms of contemporary literary practice with Imants Kalniņš’ music, there is a convincing dominance of songs with words of poetry. The aim of the article is, looking at the poetry devoted to Liepāja in the 19th century and at the turn of the 20th/21st century in the comparative aspect, to present textually thematic peculiarities as well as to provide the analytical interpretative summary of those.


Sign in / Sign up

Export Citation Format

Share Document