These days WSNs are being used in different areas like medical services, defense, such as military target tracking and surveillance, government and environmental services like natural disaster relief, hazardous environment exploration, and seismic sensing, and so forth. The data and information provided by these sensors are used to screen and control their deployed environment. The amount of information in sensor system is immense, heterogeneous and multidimensional in nature. Integration of cloud computing with a sensor system takes care of the issue of vast amount of capacity and computation power necessity of this type of system. This paper proposes a cloud based multilevel architecture for processing sensor network query to expand the lifetime of the target sensor network.
The ability to exchange secret information is critical to many commercial, governmental, and military networks. Wireless sensor intrinsic secrecy is essential for communication confidentiality, health privacy, public safety, information superiority, and economic advantage in the modern information society. Wireless Sensor security schemes have typically evolved from those developed for traditional wire line applications, these schemes do not consider physical properties of the wireless channels.
Tracking mobile targets using wireless sensor networks is a potential surveillance application of practical importance suitable for military as well as civilian fields. It can be used for guiding robots in hard to reach areas e.g. nuclear power plants etc. The capabilities of a simple target tracking solution can be enhanced by providing guidance information for a friendly object to reach the manoeuvring adversary target. This paper presents a practical architecture for target tracking using wireless sensor network by providing solutions to key components like node localization, time synchronization, target detection and tracking. The methodology presented here gives a solution to compute the state parameters of the adversary target, tracks it and associate the same with the location in the periphery of wireless sensor networks. The simulation is done using OMNeT++ under Castalia framework.
If sensor networks are to attain their potential, security is one of the most important aspects to be taken care of. The need for security in military applications is obvious, but even more benign uses, such as home health monitoring, habitat monitoring and sub surface exploration require confidentiality. WSNs are perfect for detecting environmental, biological, or chemical threats over large scale areas, but maliciously induced false alarms could completely negate value of the system. , habitat monitoring, and traffic control are presented. Technical challenges in sensor network development include network discovery, control and routing, collaborative signal and information processing, tasking and querying, and security. The paper concludes by presenting some recent research results in sensor network algorithms, including localized algorithms and directed diffusion, distributed tracking in wireless ad hoc networks, and distributed classification using local agents. R. Krithika | S. Nidhi | V. Sandhiya "A Review on Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18244.pdf
Water management is an important part of monitoring the natural environment and includes monitoring water quality of both coastal and inland marine locations. This covers the detection of pollution and monitoring the development of harmful algal blooms as well as coastal features and wave patterns. For many years water managers relied on field measurements for coastal monitoring and water quality evaluation. This type of sampling is quite limited on both temporal and spatial scales and is ineffective for capturing dynamic marine events, essential for increased knowledge and better decision making. It also involves costly, time and labour-intensive on-site sampling and data collection. The introduction of new policies such as the EU Water Framework Directive has increased pressure on governments to adopt new methods for continuous monitoring of all water bodies. In recent years, the use of in-situ wireless sensor networks (WSNs) for marine environmental monitoring has been developing to allow continuous real-time monitoring of the marine environment at greater temporal and spatial resolutions. WSNs have brought about great advantages and increased opportunities for environmental monitoring. The WSN concept envisages a world of ubiquitous sensing through large scale deployments of self-sustaining WSNs linked to digital communications, continuously monitoring our environment and detecting and reporting changes in its quality. However there are still several challenges remaining in the area of in-situ wireless sensor networks in order to realise this vision. Among these is the issue of data reliability and the need for a sensor network that adapts to changes in the availability and reliability of its own sensors, as it monitors an already changing environment. We are developing a reputation and trust based event detection system for environmental monitoring which incorporates alternative sensing modalities such as visual sensors (e.g. digital cameras and satellite sensing) and context information alongside an ...
The need for security in communications is in fact not new. This need has existed in military communications for thousands of years. In this paper, we focus on network protocols that provide security services. Wireless sensor network is an emerging technology that shows applications both for public as well as military purposes. Monitoring is one of the main applications. A large amount of redundant data is generated by sensor nodes. This paper compares all the protocols which are designed for security of wireless sensor network on the basis of security services and propose an improved protocol that reduces communication overhead by removing data redundancy from the network. By using the message sequence number we can check whether it is old message or new message. If the message is old then no need to send that message thereby reducing overhead. It also integrates security by data freshness in the protocol.
The increase in research in the area of wireless sensor networks (WSN) has brought a whole new meaning to medical devices. This is mainly due to advances in microcontroller technologies. The WSN are cited as one of the major technologies of this century and hence it assumes importance in areas such as health, psychology, fire prevention, security and even the military. The great advantage of this technology is the ability to track, monitor, study, understand and act on a particular phenomenon or event. The primary purpose of a wireless health system is reliable data transfer with minimum delay. This work is a synthesis of vast research done as Wireless Biomedical Sensor Networks (WBSN), including experimental and non-experimental investigations as well as data from the theoretical and empirical literature which incorporates a wide range of purposes: definition of concepts, review theories and evidence analysis of methodological problems, seeking to generate a consistent and understandable overview of WBSN. Such systems are already being marketed, some are still under investigation. It is also the aim of this study to identify the characteristics of a WSN applied to health. ; info:eu-repo/semantics/publishedVersion
An information procuring and processing emerging technology wireless sensor network (WSN) Consists of autonomous nodes with versatile devices underpinned by applications. Nodes are equipped with different capabilities such as sensing, computing, actuation and wireless communications etc. based on application requirements. A WSN application ranges from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. The nodes are deployed independently to cooperatively monitor the physical and environmental conditions. The architecture of WSN differs based on the application requirements and focus on low cost, flexibility, fault tolerance capability, deployment process as well as conserve energy. In this paper we have present the characteristics, architecture design objective and architecture of WSN
Distributed sensor networks have been discussed for more than 30 years, but the vision of Wireless Sensor Networks (WSNs) has been brought into reality only by the rapid advancements in the areas of sensor design, information technologies, and wireless networks that have paved the way for the proliferation of WSNs. The unique characteristics of sensor networks introduce new challenges, amongst which prolonging the sensor lifetime is the most important. WSNs have seen a tremendous growth in various application areas including health care, environmental monitoring, security, and military purposes despite prominent performance and availability challenges. Clustering plays an important role in enhancement of the life span and scalability of the network, in such applications. Although researchers continue to address these grand challenges, the type of distributions for arrivals at the cluster head and intermediary routing nodes is still an interesting area of investigation. Modelling the behaviour of the networks becomes essential for estimating the performance metrics and further lead to decisions for improving the network performance, hence highlighting the importance of identifying the type of inter-arrival distributions at the cluster head. In this paper, we present extensive discussions on the assumptions of exponential distributions in WSNs, and present numerical results based on Q-Q plots for estimating the arrival distributions. The work is further extended to understand the impact of end-to-end delay and its effect on inter-arrival time distributions, based on the type of medium access control used in WSNs. Future work is also presented on the grounds that such comparisons based on simple eye checks are insufficient. Since in many cases such plots may lead to incorrect conclusions, demanding the necessity for validating the types of distributions. Statistical analysis is necessary to estimate and validate the empirical distributions of the arrivals in WSNs.
Wireless sensor networks are a relatively new technology for information gathering and processing. A sensor network usually consists of many, resource constrained sensor nodes. These nodes perform measurements of some physical phenomena, process data, generate reports, and send these reports via multihop communication to a central information processing unit called sink. Depending on the scenario, information gathering and processing is collaboratively performed by multiple sensor nodes, e.g., to determine the average temperature in a certain area. Sensor networks can be used in a plethora of application scenarios. Emerging from military research, e.g., sensor networks for target tracking in a battlefield, sensor networks are nowadays used more and more in civil applications such as critical infrastructure monitoring. For ensuring the functionality of a sensor network, especially in malicious environments, security mechanisms are essential for all sensor networks. However, sensor networks differ from classical (wireless) networks and this consequently makes it harder to secure them. Reasons for this are resource constraints of the sensor nodes, the wireless multihop communication, and the possibility of node compromise. Since sensor nodes are often deployed in unattended or even hostile environments and are usually not equipped with tamper-resistant hardware, it is relatively easy to compromise a sensor node. By compromising a sensor node, an adversary gets access to all data stored on the node, such as cryptographic keys. Thus, deployed security mechanisms such as node-based authentication become ineffective and an adversary is able to perform attacks as a "legitimate" member of the network. Such attacks are denoted as insider attacks and pose a serious threat for wireless sensor networks. In this thesis, we develop concepts and mechanisms to cope with insider attacks in wireless sensor networks. The contribution of this thesis is twofold. First, we propose a new general classification to classify the different approaches to protect against insider attacks. Second, we propose several security protocols to protect against insider attacks. In our classification, approaches to protect against insider attacks are first distinguished by the implemented security strategy. The respective strategies are further subclassified by the applied mechanisms. Related work is integrated in the classification to systematically identify open problems and specific properties in the respective areas. The results may be a basis for future protocol design. The protocols, proposed in the second part of this thesis encompass different areas. First, we propose a protocol to protect against a serious Denial-of-Service attack where an adversary injects or replays a large amount of false messages to overload many message forwarding nodes and to (totally) waste their scarce energy resources. Proposed approaches usually apply threshold-based mechanisms to filter such messages out. The drawback of this approach is that messages are not filtered out immediately and if the threshold of compromised nodes is reached, the attack becomes again possible. Our protocol is able to immediately filter such messages while tolerating an arbitrary number of compromised sensor nodes. Further mechanisms are required to additionally protect against an insider attack where an adversary injects false reports to deceive the sink. Usually a redundancy-based approach is used where a report is only valid if it has been collaboratively generated by multiple sensor nodes. However, previously proposed protocols are susceptible to an insider attack where an adversary that has compromised only a single node might be able to impede a successful report generation. So far, only one protocol has been proposed to cope with this issue. However, it is a specific enhancement for a particular protocol and the attacking nodes cannot be identified and excluded. In this thesis, we propose two protocols which protect against the injection of false reports and also enable the detection and exclusion of nodes trying to disrupt the collaborative report generation. In addition, our protocols can be used in combination with or as an extension to any other protocol. In addition, we investigate a general approach to prevent insider attacks and to detect compromised nodes in certain scenarios. We propose to use tamper-resistant hardware in form of the Trusted Platform Module (TPM). Due to cost reasons, the TPM is integrated only in some special sensor nodes that perform some special tasks such as key management, localization or time synchronization in the sensor network. These nodes are a valuable target for an adversary. To detect tampering attempts on these nodes, we propose two efficient attestation protocols. In contrast to attestation protocols proposed for "classical" networks, our protocols have a low communication and computational overhead. They do not require expensive public key operations on the verifying nodes and the few exchanged messages are very short. In addition, compared to software-based attestation, our protocols have the advantage to enable attestation along multiple hops which is of high concern in sensor networks. Using our approach, it is possible to verify the trustworthiness of certain sensor nodes even in unattended or hostile environments making them suitable to perform special tasks.
Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.
Wireless Sensor Networks (WSNs), consisting of many small sensing devices working in concert, have the potential to revolutionise every aspect of our lives. Although the technology is still in its infancy offers an unlimited number of possible applications, ranging from military surveillance to environmental monitoring. These WSNs are prone to physical sensor failures due to environmental conditions such bio fouling and an adverse ambient environment, as well as threats that arise from their operation in an open environment. Consequently, reliability and fault-tolerance techniques become a critical aspect of the research associated with WSNs. In mission critical applications, such as the monitoring of enemy troops, unreliable or faulty information produced by WSNs could potentially lead to fatal outcomes. In such applications, it necessary to receive both a correct notification of event occurrences and uncorrupted data. Developing a fault-tolerance system for WSNs is a challenging task. New self-configuration, self-recognition and self-organisation techniques are needed due to unique aspects of the operation of WSNs. Our current understanding of WSNs leads to an immunologically inspired solution to the design of a fault-tolerant network. One of the main roles of the Natural Immune System(NIS) is the recognition of self and the elimination of non-self proteins. Hence, in order to have an immune system equivalent for a sensor network, we must have a clear and stable definition of what constitutes the Self and the Non-Self Sets in a sensor network. This thesis explores two different approaches to modelling, collection and representation of the Self-Set in distributed sensor networks. We approach this problem, of identifying what constitutes the Self-Set in terms of sensor readings, using pattern recognition techniques from the machine learning field that leverages a small number of past observations of sensor nodes. We have chosen Competitive Learning Neural Network (CLNN) for the construction of the Self-Set. We ...