scholarly journals A Novel and Efficient Priority-Based Cross-Layer Contextual Unobservability Scheme Against Global Attacks for WMSNs

Author(s):  
Islam T. Almalkawi ◽  
Jafar Raed ◽  
Ayoub Alsarhan ◽  
Alaa Abdallah ◽  
Emad Abdallah

Even though many security schemes proposed for wireless sensor networks protect transmitted data content from being revealed to different types of attacks and fulfill most of the desired security requirements, they are not addressing concealing the privacy of the contextual information. Contextual information such as event occurrence, event time, and event location can be exposed to an adversary by just monitoring network packet transmission. This kind of information is very important because it can leak location information of key nodes or even detected events themselves. Therefore, proposing a contextual unobservability scheme is a challenging task in sensor networks considering many issues: the broadcast nature of the wireless channel, the different attacker models, the network resource constraints, and the overhead on system performance. Most of the existing location privacy schemes are not addressing all these issues and are either not efficient against global adversaries or degrade significantly network performance. Thus in this paper, we propose an efficient location contextual anonymity scheme for Wireless Multimedia Sensor Network (WMSN) that exploits the cross-layer joint design among the application, routing, and MAC layers. Our proposed location unobservability scheme combines the source coding technique, probabilistic packet transmission, multipath routing, and priority-based dropping policy to enhance the efficiency level of the provided privacy service without noticeably affecting the Quality of Service (QoS) requirement for delivering multimedia content in WMSN. Performance evaluation results show that our proposed privacy mechanism outperforms other proposed location privacy techniques in terms of privacy efficiency (safety period) and network performance (end-to-end delay and energy consumption).

Energies ◽  
2021 ◽  
Vol 14 (17) ◽  
pp. 5379
Author(s):  
Gustavo A. Nunez Segura ◽  
Cintia Borges Margi

Resource Constraints in Wireless Sensor Networks are a key factor in protocols and application design. Furthermore, energy consumption plays an important role in protocols decisions, such as routing metrics. In Software-Defined Networking (SDN)-based networks, the controller is in charge of all control and routing decisions. Using energy as a metric requires such information from the nodes, which would increase packets traffic, impacting the network performance. Previous works have used energy prediction techniques to reduce the number of packets exchanged in traditional distributed routing protocols. We applied this technique in Software-Defined Wireless Sensor Networks (SDWSN). For this, we implemented an energy prediction algorithm for SDWSN using Markov chain. We evaluated its performance executing the prediction on every node and on the SDN controller. Then, we compared their results with the case without prediction. Our results showed that by running the Markov chain on the controller we obtain better prediction and network performance than when running the predictions on every node. Furthermore, we reduced the energy consumption for topologies up to 49 nodes for the case without prediction.


2018 ◽  
Vol 7 (3.3) ◽  
pp. 26
Author(s):  
R Abinaya ◽  
C Bhuvaneshwari ◽  
R Gayathri

The increasing demand of wireless sensors in mission critical applications renders the Quality-of-Service (QoS) to be one of vital issue in wireless sensor network. It is necessary to deal with the underlying variance between energy efficiency and QoS, since sensor networks have different resource constraints. To manage these constraints such as unreliable links, limited power and other environmental factors in sensor networks, cross-layer approach is designed to ensure QoS. Recent routing protocols rely on the duty-cycle which causes sensor nodes to lose ample amount of energy by monitoring idle channels. In addition, opportunistic forwarding of packet leads to multiple receiver’s receiving the same packet which induces redundancy. To address these issues, we propose a novel Opportunistic Routing with Adaptive REceiver (O-RARE) protocol as an alternative to duty cycle mechanism. The proposed work aims at reducing idle listening and redundancy by enabling low-power receiver at physical layer. Hence O-RARE is designed to ensure reliable and adaptive routing in our work through interactions among cross-layer.  


Author(s):  
Vinod Vijaykumar Kimbahune ◽  
Arvind V. Deshpande ◽  
Parikshit Narendra Mahalle

The continuous evolution of Next Generation Internet (NGI) amplifies the demand for efficient and secure communication capable of responding effectively to the challenges posed by the emerging applications. For secure communication between two sensor nodes, a secret key is needed. Cryptographic key management is a challenging task in sensor networks as the hostile environment of sensor networks makes it more prone to attacks. Apart from resource constraints of the devices, unknown topology of the network, the higher risk of node capture and lack of a fixed infrastructure makes the key management more challenging in Wireless Sensor Network (WSN). Paper surveys different key Management schemes for WSN. The paper presents the efficiency versus security requirements tradeoffs in key management for WSN. Paper also proposes a novel key management protocol which provides strong resistance against replay attacks. The results obtained from the mathematical model based on conditional probability of the scheme suggest that the proposed key management in NGI is efficient and attack resistant.


Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4813
Author(s):  
Faisal Abdulaziz Alfouzan ◽  
Seyed Mohammad Ghoreyshi ◽  
Alireza Shahrabi ◽  
Mahsa Sadeghi Ghahroudi

Underwater sensor networks (UWSNs) have recently attracted much attention due to their ability to discover and monitor the aquatic environment. However, acoustic communication has posed some significant challenges, such as high propagation delay, low available bandwidth, and high bit error rate. Therefore, proposing a cross-layer protocol is of high importance to the field to integrate different communication functionalities (i.e, an interaction between data link layer and network layer) to interact in a more reliable and flexible manner to overcome the consequences of applying acoustic signals. In this paper, a novel Cross-Layer Mobile Data gathering (CLMD) scheme for Underwater Sensor Networks (UWSNs) is presented to improve the performance by providing the interaction between the MAC and routing layers. In CLMD, an Autonomous Underwater Vehicle (AUV) is used to periodically visit a group of clusters which are responsible for data collection from members. The communications are managed by using a distributed cross-layer solution to enhance network performance in terms of packet delivery and energy saving. The cluster heads are replaced with other candidate members at the end of each operational phase to prolong the network lifetime. The effectiveness of CLMD is verified through an extensive simulation study which reveals the performance improvement in the energy-saving, network lifetime, and packet delivery ratio with varying number of nodes. The effects of MAC protocols are also studied by studying the network performance under various MAC protocols in terms of packet delivery ratio, goodput, and energy consumption with varying density of nodes.


2017 ◽  
Vol 8 (1) ◽  
pp. 50-69 ◽  
Author(s):  
Vinod Vijaykumar Kimbahune ◽  
Arvind V. Deshpande ◽  
Parikshit N Mahalle

The continuous evolution of Next Generation Internet (NGI) amplifies the demand for efficient and secure communication capable of responding effectively to the challenges posed by the emerging applications. For secure communication between two sensor nodes, a secret key is needed. Cryptographic key management is a challenging task in sensor networks as the hostile environment of sensor networks makes it more prone to attacks. Apart from resource constraints of the devices, unknown topology of the network, the higher risk of node capture and lack of a fixed infrastructure makes the key management more challenging in Wireless Sensor Network (WSN). Paper surveys different key Management schemes for WSN. The paper presents the efficiency versus security requirements tradeoffs in key management for WSN. Paper also proposes a novel key management protocol which provides strong resistance against replay attacks. The results obtained from the mathematical model based on conditional probability of the scheme suggest that the proposed key management in NGI is efficient and attack resistant.


2021 ◽  
Vol 5 (2) ◽  
pp. 52-55
Author(s):  
Reem J. Ismail ◽  
Khalid F. Jasim ◽  
Samar J. Ismael ◽  
Soma A. M. Solaimanzadeh

Wireless sensor networks aim to develop a smart city based on sensing environment. The routing protocols of wireless sensor networks is important to transfer the data in smart cities since sensor nodes have limited power and transmission range. The aim of this research is to enhance wireless sensor networks routing protocols based on proposed cross-layer interaction between physical layer and network layer also a proposed routing table information of wireless sensor nodes is developed to consider the transmission power of neighbor’s nodes to determine the next hop. Cross-layer interaction provides a useful information and effective adaptation for WSN routing protocols. As a result, the proposed routing protocol shows an improvement in network performance when number of intermediate nodes are minimized.


2015 ◽  
Vol E98.B (7) ◽  
pp. 1333-1344
Author(s):  
Raymundo BUENROSTRO-MARISCAL ◽  
Maria COSIO-LEON ◽  
Juan-Ivan NIETO-HIPOLITO ◽  
Juan-Antonio GUERRERO-IBANEZ ◽  
Mabel VAZQUEZ-BRISENO ◽  
...  

2017 ◽  
pp. 252
Author(s):  
Mohammed A. Abuhelaleh ◽  
Tahseen A. Al-Ramadin ◽  
Bassam A. Alqaralleh ◽  
Moha'med Al-Jaafereh ◽  
Khaled Almi'ani

2016 ◽  
pp. 221
Author(s):  
Mohammed A. Abuhelaleh ◽  
Tahseen A. Al-Ramadin ◽  
Khaled Almi'ani ◽  
Moha'med Al-Jaafereh ◽  
Bassam A. Alqaralleh

Sign in / Sign up

Export Citation Format

Share Document