scholarly journals Analysis of hybrid approach for Answering holistic queries in Wireless Sensor

Author(s):  
Meenakshi Bhrugubanda

Sensor networks are greatly utilized in unique areas like the transportation methods, wellbeing monitoring, soil monitoring, habitat monitoring and so forth. Clients pose queries to sensors and acquire sensing information. In view of the low quality detecting devices, sensor information is regularly boisterous. Continuous queries are more commonly employed to increase the reliability of query result. On this work we revolve round on regular holistic queries like Median. Present methodologies are for essentially the most phase supposed for non-holistic queries like Average. As a result of the no decomposable property of sensors, answering holistic queries are given much less value. We initially recommend two ways elegant on the information correlation be tween’s two rounds, with one for finding the detailed solutions and the other one for opting for the estimated outcome. We at that factor consolidate the two proposed plans into a hybrid methodology, which is flexible to the information evolving velocity. The effects show that our methodology has reduced the traffic rate even as keeping equal accuracy.

2021 ◽  
Author(s):  
Sharmila ◽  
Pramod Kumar ◽  
Shashi Bhushan ◽  
Manoj Kumar ◽  
Mamoun Alazab

Abstract Wireless Sensor Networks (WSNs) play a crucial role in developing the Internet of Things (IoT) by collecting data from hostile environments like military and civil domains with limited resources. The above applications are prone to eavesdropper due to cryptographic algorithms' weaknesses for providing security in WSNs. The security protocols for WSNs are different from the traditional networks because of the limited resource of sensor nodes. Existing key management schemes require large key sizes to provide high-security levels, increasing the computational and communication cost for key establishment. This paper proposes a Hybrid Key Management Scheme for WSNs based on Elliptic Curve Cryptography (ECC) and a hash function to generate key pre-distribution keys. The Key establishment is carried out by merely broadcasting the node identity. The main reason for incorporating a hybrid approach in the key pre-distribution method is to achieve mutual authentication between the sensor nodes during the establishment phase. The proposed method reduces computational complexity with greater security and the proposed scheme can be competently applied into resource constraint sensor nodes


Vestnik MEI ◽  
2021 ◽  
Vol 2 (2) ◽  
pp. 108-118
Author(s):  
Aleksandr B. Frolov ◽  
◽  
Natalya P. Kochetova ◽  
Anton O. Klyagin ◽  
Dmitriy Yu. Temnikov ◽  
...  

Algorithmic approach principles relating to development and use of wireless sensor network (WSS) key spaces are formulated based on an analysis of the keys management peculiarities. The formulated principles, which meet certain requirements for the WSS key spaces, have been elaborated proceeding from the assumption that their structure corresponds to one of the varieties of combinatorial block diagrams: cyclic or acyclic projective plane, linear or quadratic transversal block diagrams. Owing to the WSS having a distributed configuration, it becomes possible to avoid the need to construct a combinatorial block diagram in full scope, and the required blocks are computed, whenever necessary, in scaling the network (in adding new nodes) or when determining, in a decentralized manner, the switching parameters of specific nodes. To do so, it is necessary to have algorithms for computing the blocks of the combinatorial block diagram (as the sets of key numbers allocated to a given node) and dual blocks (as the sets of the numbers of nodes to which keys are assigned with the numbers coinciding with the numbers of dual blocks), as well as algorithms for solving derived problems: computing of the key numbers common to two nodes and the number of the node that has a common key with one of two nodes and, possibly, another key with the other one. These problems are solved by using the numbering of elements, blocks and dual blocks in accordance with the proposed duality rule: sets of elements and dual blocks are in one-to-one correspondence by numbering; the dual block with a specified number contains the numbers of blocks containing elements with this number. Distributed (independent) calculation of blocks is carried out on the basis of algebraic identifiers computed by block numbers. In addition to the possible absence of a physical connection between the nodes, the inadmissibility of using separate (compromised) keys is taken into account, and the incomplete furnishing of the network nodes with keys, as well as the incompleteness of the system implementation as a whole. Algorithms for computing the switching parameters of two nodes in designing the WSS and an algorithm for computer modeling of the calculation of such parameters during the WSS operation subject to the specified constraints and in using any of the above types of combinatorial block diagrams are presented.


2020 ◽  
pp. 857-880
Author(s):  
Madhuri Rao ◽  
Narendra Kumar Kamila

Wireless Sensor nodes are being employed in various applications like in traffic control, battlefield, and habitat monitoring, emergency rescue, aerospace systems, healthcare systems and in intruder tracking recently. Tracking techniques differ in almost every application of Wireless Sensor Network (WSN), as WSN is itself application specific. The chapter aims to present the current state of art of the tracking techniques. It throws light on how mathematically target tracking is perceived and then explains tracking schemes and routing techniques based on tracking techniques. An insight of how to code localization techniques in matlab simulation tool is provided and analyzed. It further draws the attention of the readers to types of tracking scenarios. Some of the well established tracking techniques are also surveyed for the reader's benefit. The chapter presents with open research challenges that need to be addressed along with target tracking in wireless sensor networks.


Sign in / Sign up

Export Citation Format

Share Document