1) The document discusses various design issues and challenges in distributed sensor networks, including limited resources of sensor nodes, scalability, frequent topology changes, and data aggregation.
2) Data aggregation aims to reduce redundant data by having sensor nodes combine and summarize correlated sensor readings. This helps reduce transmission costs and bandwidth usage.
3) Time synchronization is also an important challenge as many sensor network applications require correlating sensor readings with physical times, but achieving precise synchronization is difficult given the networks' constraints.
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
1. The document discusses a secure data dissemination protocol for wireless sensor networks using XOR network coding. It aims to achieve fast, secure, reliable and energy efficient data dissemination.
2. Wireless sensor networks require regular software updates through the wireless medium, which is known as data dissemination or network reprogramming. Existing dissemination protocols have security issues when combined with network coding techniques.
3. The proposed protocol uses simple cryptographic techniques with network coding to prevent pollution and denial of service attacks, while still achieving fast dissemination. It focuses on disseminating small data values securely and efficiently in wireless sensor networks.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
The document discusses a data dissemination protocol called seDrip for wireless sensor networks. seDrip allows multiple authorized network users to simultaneously distribute data items directly to sensor nodes, without relying on a central sink node. It implements authentication using digital signatures to provide security and prevent unauthorized access. The protocol is analyzed and shown to satisfy security requirements like authenticity, integrity, and resistance to denial-of-service attacks. RSA encryption is used to encode data for confidentiality.
Energy efficient intrusion detection systemiaemedu
This document discusses energy efficient intrusion detection systems for wireless sensor networks. It proposes a hybrid intrusion detection system (HIDS) that considers both the energy consumption and past behavior of nodes. The HIDS classifies nodes as malicious or normal using an energy prediction approach, and then further analyzes abnormal packets sent by malicious nodes using a misuse detection module. By taking both energy patterns and past transmissions into account, the proposed HIDS aims to more accurately detect intrusions while minimizing energy usage compared to other intrusion detection schemes for wireless sensor networks.
Secure transmission in wireless sensor networks data using linear kolmogorov ...csandit
In Wireless sensor networks (WSNs), All communications between different nodes are sent out
in a broadcast fashion. These networks are used in a variety of applications including military,
environmental, and smart spaces. Sensors are susceptible to various types of attack, such as
data modification, data insertion and deletion, or even physical capture and sensor
replacement. Hence security becomes important issue in WSNs. However given the fact that
sensors are resources constrained, hence the traditional intensive security algorithms are not
well suited for WSNs. This makes traditional security techniques, based on data encryption, not
very suitable for WSNs. This paper proposes Linear Kolmogorov watermarking technique for
secure data communication in WSNs. We provide a security analysis to show the robustness of
the proposed techniques against various types of attacks. This technique is robust against data
deletion, packet replication and Sybil attacks
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...IRJET Journal
This document proposes a cross-layer commit protocol for sensor data aggregation in smart cities. It implements query-based data aggregation using the network and application layers. The application layer initiates queries that are sent to sensor nodes. Nodes that can provide the requested data reply to form clusters. The node with the highest residual energy and closest average distance to members is selected as cluster head. As cluster head, it collects and aggregates data from members and sends it to the sink node. This approach reduces energy consumption compared to other data aggregation methods. A prototype was created to test the protocol for applications like garbage monitoring and weather sensing.
This document discusses using wireless sensor networks for habitat monitoring. It presents requirements for a system to monitor seabird nesting environments and behaviors. The currently deployed network consists of 32 sensor nodes on an island off the coast of Maine that stream live data online. The application-driven design helps identify important areas for further work like data sampling, communications, network tasks, and health monitoring.
11.providing security to wireless packet networks by using optimized security...Alexander Decker
This document discusses providing security to wireless packet networks using an optimized security method. It proposes encrypting data packets when they are scheduled using the Blowfish encryption algorithm. This would secure the packets at the initial level of scheduling, preventing attackers from modifying packets even if they are delayed. The document outlines the Blowfish algorithm and its use of variable-length keys and data encryption in rounds to encrypt packets. It also describes the system model used and assumptions made, including modeling the wireless channel as a switch and defining packet attributes like arrival time, processing time, security level and deadline. Encrypting packets at the scheduling level with Blowfish aims to securely transmit real-time data over wireless networks.
Wireless Sensor Networks UNIT-1
You can watch my lectures at:
Digital electronics playlist in my youtube channel:
https://www.youtube.com/channel/UC_fItK7wBO6zdWHVPIYV8dQ?view_as=subscriber
My Website : https://easyninspire.blogspot.com/
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
1. The document discusses a secure data dissemination protocol for wireless sensor networks using XOR network coding. It aims to achieve fast, secure, reliable and energy efficient data dissemination.
2. Wireless sensor networks require regular software updates through the wireless medium, which is known as data dissemination or network reprogramming. Existing dissemination protocols have security issues when combined with network coding techniques.
3. The proposed protocol uses simple cryptographic techniques with network coding to prevent pollution and denial of service attacks, while still achieving fast dissemination. It focuses on disseminating small data values securely and efficiently in wireless sensor networks.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
The document discusses a data dissemination protocol called seDrip for wireless sensor networks. seDrip allows multiple authorized network users to simultaneously distribute data items directly to sensor nodes, without relying on a central sink node. It implements authentication using digital signatures to provide security and prevent unauthorized access. The protocol is analyzed and shown to satisfy security requirements like authenticity, integrity, and resistance to denial-of-service attacks. RSA encryption is used to encode data for confidentiality.
Energy efficient intrusion detection systemiaemedu
This document discusses energy efficient intrusion detection systems for wireless sensor networks. It proposes a hybrid intrusion detection system (HIDS) that considers both the energy consumption and past behavior of nodes. The HIDS classifies nodes as malicious or normal using an energy prediction approach, and then further analyzes abnormal packets sent by malicious nodes using a misuse detection module. By taking both energy patterns and past transmissions into account, the proposed HIDS aims to more accurately detect intrusions while minimizing energy usage compared to other intrusion detection schemes for wireless sensor networks.
Secure transmission in wireless sensor networks data using linear kolmogorov ...csandit
In Wireless sensor networks (WSNs), All communications between different nodes are sent out
in a broadcast fashion. These networks are used in a variety of applications including military,
environmental, and smart spaces. Sensors are susceptible to various types of attack, such as
data modification, data insertion and deletion, or even physical capture and sensor
replacement. Hence security becomes important issue in WSNs. However given the fact that
sensors are resources constrained, hence the traditional intensive security algorithms are not
well suited for WSNs. This makes traditional security techniques, based on data encryption, not
very suitable for WSNs. This paper proposes Linear Kolmogorov watermarking technique for
secure data communication in WSNs. We provide a security analysis to show the robustness of
the proposed techniques against various types of attacks. This technique is robust against data
deletion, packet replication and Sybil attacks
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...IRJET Journal
This document proposes a cross-layer commit protocol for sensor data aggregation in smart cities. It implements query-based data aggregation using the network and application layers. The application layer initiates queries that are sent to sensor nodes. Nodes that can provide the requested data reply to form clusters. The node with the highest residual energy and closest average distance to members is selected as cluster head. As cluster head, it collects and aggregates data from members and sends it to the sink node. This approach reduces energy consumption compared to other data aggregation methods. A prototype was created to test the protocol for applications like garbage monitoring and weather sensing.
This document discusses using wireless sensor networks for habitat monitoring. It presents requirements for a system to monitor seabird nesting environments and behaviors. The currently deployed network consists of 32 sensor nodes on an island off the coast of Maine that stream live data online. The application-driven design helps identify important areas for further work like data sampling, communications, network tasks, and health monitoring.
11.providing security to wireless packet networks by using optimized security...Alexander Decker
This document discusses providing security to wireless packet networks using an optimized security method. It proposes encrypting data packets when they are scheduled using the Blowfish encryption algorithm. This would secure the packets at the initial level of scheduling, preventing attackers from modifying packets even if they are delayed. The document outlines the Blowfish algorithm and its use of variable-length keys and data encryption in rounds to encrypt packets. It also describes the system model used and assumptions made, including modeling the wireless channel as a switch and defining packet attributes like arrival time, processing time, security level and deadline. Encrypting packets at the scheduling level with Blowfish aims to securely transmit real-time data over wireless networks.
Wireless Sensor Networks UNIT-1
You can watch my lectures at:
Digital electronics playlist in my youtube channel:
https://www.youtube.com/channel/UC_fItK7wBO6zdWHVPIYV8dQ?view_as=subscriber
My Website : https://easyninspire.blogspot.com/
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...IJNSA Journal
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defence against a variety of attacks that can compromise the security and proper functioning of an enterprise information system. Along with the widespread evolution of new emerging services, the quantity and impact of attacks have continuously increased, attackers continuously find vulnerabilities at various levels, from the network itself to operating system and applications, exploit them to crack system and services. Network defence and network monitoring has become an essential component of computer security to predict and prevent attacks. Unlike traditional Intrusion Detection System (IDS), Intrusion Detection and Prevention System (IDPS) have additional features to secure computer networks.
In this paper, we present a detailed study of how deployment of an IDPS plays a key role in its performance and the ability to detect and prevent known as well as unknown attacks. We categorize IDPS based on deployment as Network-based, host-based, and Perimeter-based and Hybrid. A detailed comparison is shown in this paper and finally we justify our proposed solution, which deploys agents at host-level to give better performance in terms of reduced rate of false positives and accurate detection and prevention.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
This document proposes a novel Software Agent Based Forest Fire Detection (SAFFD) approach that uses software agents to disseminate data and make decisions about forest fire detection in a wireless sensor network. The SAFFD approach works in two phases: 1) a data collection phase where a mobile agent collects sensed data from sensor nodes and aggregates it, and 2) a risk analysis phase where an actor node analyzes the aggregated data to determine the fire risk level (green, yellow, or red) and take appropriate action. The implementation of SAFFD using Aglets mobile agents showed significant increases in the lifetime of the wireless sensor network by reducing the number of transmitted packets compared to a client-server approach.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor networks (WSNs), a dynamic coordinate system, and a scalable energy-efficient training protocol for collections of nodes deployed in the space that are initially anonymous, asynchronous, and unaware of their initial location. The 3D WSNs considered comprise massively deployed tiny energy-constrained commodity sensors and one or more sink nodes that provide an interface to the outside world. The proposed architecture is a generalization of a two-dimensional virtual architecture previously proposed in the literature, in which a flexible and intuitive coordinate system is imposed onto the deployment area and the anonymous nodes are partitioned into clusters where data can be gathered from the environment and synthesized under local control. The architecture solves the hidden sensors problem that occurs because of irregularities in rugged deployment areas or environments containing buildings by training the network of nodes arbitrarily dispersed in the 3D space. In addition, we derive two simple and energy-efficient routing protocols, respectively for dense and sparse networks, based on the proposed dynamic coordinate system. They are used to minimize the power expended in collecting and routing data to the sink node, thus increasing the lifetime of the network.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
Network Forensics is fairly a new area of research which would be used after an intrusion in various
organizations ranging from small, mid-size private companies and government corporations to the defence
secretariat of a country. At the point of an investigation valuable information may be mishandled which
leads to difficulties in the examination and time wastage. Additionally the intruder could obliterate tracks
such as intrusion entry, vulnerabilities used in an entry, destruction caused, and most importantly the
identity of the intruder. The aim of this research was to map the correlation between network security and
network forensic mechanisms. There are three sub research questions that had been studied. Those have
identified Network Security issues, Network Forensic investigations used in an incident, and the use of
network forensics mechanisms to eliminate network security issues. Literature review has been the
research strategy used in order study the sub research questions discussed. Literature such as research
papers published in Journals, PhD Theses, ISO standards, and other official research papers have been
evaluated and have been the base of this research. The deliverables or the output of this research was
produced as a report on how network forensics has assisted in aligning network security in case of an
intrusion. This research has not been specific to an organization but has given a general overview about
the industry. Embedding Digital Forensics Framework, Network Forensic Development Life Cycle, and
Enhanced Network Forensic Cycle could be used to develop a secure network. Through the mentioned
framework, and cycles the author has recommended implementing the 4R Strategy (Resistance,
Recognition, Recovery, Redress) with the assistance of a number of tools. This research would be of
interest to Network Administrators, Network Managers, Network Security personnel, and other personnel
interested in obtaining knowledge in securing communication devices/infrastructure. This research
provides a framework that can be used in an organization to eliminate digital anomalies through network
forensics, helps the above mentioned persons to prepare infrastructure readiness for threats and also
enables further research to be carried on in the fields of computer, database, mobile, video, and audio.
The document discusses security mechanisms for spontaneous networks. It begins with an overview of the growth of mobile communications and challenges in configuring services and providing security in spontaneous networks that imitate human relationships. Key management schemes are needed for node authorization and user authentication in mobile ad hoc networks. Existing methods require initial configuration or external authorities. The proposed system aims to reduce dependence on a central authority for re-authentication to avoid possible attacks, increase performance by reducing server utilization, and implement a workload mechanism for efficient server usage.
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...IRJET Journal
This document summarizes a survey on using machine learning techniques in an SDN-based network intrusion detection system. It discusses how SDN allows centralized control and monitoring of network traffic. Machine learning and deep learning can be applied to the monitored traffic to detect anomalies and threats. Specifically, the document examines using long short-term memory neural networks and artificial neural networks to classify traffic and improve detection accuracy in the SDN environment. The goal is to increase the effectiveness of the network intrusion detection system at identifying security issues.
This document summarizes a research paper that proposes a methodology to improve source location privacy preservation in wireless sensor networks. The paper introduces the concept of "interval indistinguishability" to quantify anonymity. It maps the problem of breaching source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. The paper proposes modeling anonymity, describes the network and adversarial models, and reviews related work before introducing its methodology. The methodology aims to address issues with existing solutions and practically prove the efficiency of improving source location privacy through a modified statistical framework.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
The document summarizes a presentation on research challenges in networked systems. It discusses recommendations from an evaluation of ICT research in Norway, including better aligning research with industry needs. It looks back at topics from 2000 like wireless sensor networks and voice over IP. Potential future areas discussed include cloud computing, cyber-physical systems, smart grids, and security. The presentation calls for more experimental research, collaboration, and evaluation to address open challenges in these emerging areas.
This document summarizes research on coverage problems in wireless sensor networks in the presence of obstacles. It begins with definitions of key concepts related to sensor network coverage, including different types of coverage problems (point, area, barrier), deployment strategies (deterministic, random), coverage degrees, sensing models, and obstacles. It then reviews several approaches that have been proposed to address coverage problems when obstacles are present in the sensor field, including using computational geometry concepts to handle obstacles. The document concludes by noting that more work is still needed to fully address coverage problems in realistic environments with obstacles.
The document discusses utilizing weight allocation in a term frequency-inverse document frequency (TF-IDF) environment to identify and remove noisy data from social media for improved customer segmentation and targeted advertising. Specifically, it aims to recognize keywords that can help cluster social media users based on demographics and behaviors while eliminating uninfluential data. The approach assigns higher weight to words that frequently appear in a document but rarely in the entire collection compared to common words.
This document analyzes helical compression springs used in the rear suspension of two-wheeled vehicles. It presents analytical calculations and finite element analysis to determine stresses and deflections in springs made of hard carbon steel and chrome vanadium steel with circular and rectangular cross-sections under various loads. The results show that chrome vanadium steel springs have lower deflections than hard carbon steel springs under the same loads. Chrome vanadium steel is also concluded to be a better replacement material due to its lower cost and ability to work efficiently with less maintenance.
The document summarizes research on the temperature dependence of microwave characteristics of an n++np++ silicon IMPATT diode operating in the X band (8-12 GHz) frequency range. As the diode junction temperature increases from 100°C to 220°C, key findings include:
1) The negative microwave resistance and positive series resistance of the diode degrade due to changes in electron/hole ionization rates and drift velocities with rising temperature.
2) The series resistance, which contributes to Joule heating, increases with temperature.
3) Numerical simulations following Gummel-Blue analysis show the negative resistance decreases from -11.65 ohms at 100°C to -8.25 ohms at 200
Challenging Issues and Similarity Measures for Web Document ClusteringIOSR Journals
This document discusses challenging issues and similarity measures for web document clustering. It begins with an introduction to text mining and document clustering. It then reviews related work on similarity approaches and measures. Some key challenging issues in web document clustering are discussed, such as measuring semantic similarity between words and evaluating cluster validity. Various types of similarity measures are also described, including string-based measures like Jaro-Winkler distance and corpus-based measures like latent semantic analysis. The conclusion states that accurate clustering requires a precise definition of similarity between document pairs and discusses different similarity measures that can be used.
Preventing Web-Proxy Based DDoS using Request Sequence Frequency IOSR Journals
This document discusses preventing distributed denial of service (DDoS) attacks that use web proxies. It proposes detecting abnormal request sequences from web proxies by analyzing the frequency of request sequences and comparing it to a web proxy's historical behavioral profile. When abnormal sequences are detected, a "soft-control" approach is used to reshape suspicious sequences rather than rejecting the entire sequence, to avoid impacting legitimate users. A hidden semi-Markov model is used to model the temporal and spatial behavior of web proxy traffic over time. This allows both fine-grained and coarse-grained detection of attacks at the server level, independently of traffic intensity or changing web content.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...IJNSA Journal
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defence against a variety of attacks that can compromise the security and proper functioning of an enterprise information system. Along with the widespread evolution of new emerging services, the quantity and impact of attacks have continuously increased, attackers continuously find vulnerabilities at various levels, from the network itself to operating system and applications, exploit them to crack system and services. Network defence and network monitoring has become an essential component of computer security to predict and prevent attacks. Unlike traditional Intrusion Detection System (IDS), Intrusion Detection and Prevention System (IDPS) have additional features to secure computer networks.
In this paper, we present a detailed study of how deployment of an IDPS plays a key role in its performance and the ability to detect and prevent known as well as unknown attacks. We categorize IDPS based on deployment as Network-based, host-based, and Perimeter-based and Hybrid. A detailed comparison is shown in this paper and finally we justify our proposed solution, which deploys agents at host-level to give better performance in terms of reduced rate of false positives and accurate detection and prevention.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
This document proposes a novel Software Agent Based Forest Fire Detection (SAFFD) approach that uses software agents to disseminate data and make decisions about forest fire detection in a wireless sensor network. The SAFFD approach works in two phases: 1) a data collection phase where a mobile agent collects sensed data from sensor nodes and aggregates it, and 2) a risk analysis phase where an actor node analyzes the aggregated data to determine the fire risk level (green, yellow, or red) and take appropriate action. The implementation of SAFFD using Aglets mobile agents showed significant increases in the lifetime of the wireless sensor network by reducing the number of transmitted packets compared to a client-server approach.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
This paper proposes a virtual architecture for three-dimensional (3D) wireless sensor networks (WSNs), a dynamic coordinate system, and a scalable energy-efficient training protocol for collections of nodes deployed in the space that are initially anonymous, asynchronous, and unaware of their initial location. The 3D WSNs considered comprise massively deployed tiny energy-constrained commodity sensors and one or more sink nodes that provide an interface to the outside world. The proposed architecture is a generalization of a two-dimensional virtual architecture previously proposed in the literature, in which a flexible and intuitive coordinate system is imposed onto the deployment area and the anonymous nodes are partitioned into clusters where data can be gathered from the environment and synthesized under local control. The architecture solves the hidden sensors problem that occurs because of irregularities in rugged deployment areas or environments containing buildings by training the network of nodes arbitrarily dispersed in the 3D space. In addition, we derive two simple and energy-efficient routing protocols, respectively for dense and sparse networks, based on the proposed dynamic coordinate system. They are used to minimize the power expended in collecting and routing data to the sink node, thus increasing the lifetime of the network.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
Network Forensics is fairly a new area of research which would be used after an intrusion in various
organizations ranging from small, mid-size private companies and government corporations to the defence
secretariat of a country. At the point of an investigation valuable information may be mishandled which
leads to difficulties in the examination and time wastage. Additionally the intruder could obliterate tracks
such as intrusion entry, vulnerabilities used in an entry, destruction caused, and most importantly the
identity of the intruder. The aim of this research was to map the correlation between network security and
network forensic mechanisms. There are three sub research questions that had been studied. Those have
identified Network Security issues, Network Forensic investigations used in an incident, and the use of
network forensics mechanisms to eliminate network security issues. Literature review has been the
research strategy used in order study the sub research questions discussed. Literature such as research
papers published in Journals, PhD Theses, ISO standards, and other official research papers have been
evaluated and have been the base of this research. The deliverables or the output of this research was
produced as a report on how network forensics has assisted in aligning network security in case of an
intrusion. This research has not been specific to an organization but has given a general overview about
the industry. Embedding Digital Forensics Framework, Network Forensic Development Life Cycle, and
Enhanced Network Forensic Cycle could be used to develop a secure network. Through the mentioned
framework, and cycles the author has recommended implementing the 4R Strategy (Resistance,
Recognition, Recovery, Redress) with the assistance of a number of tools. This research would be of
interest to Network Administrators, Network Managers, Network Security personnel, and other personnel
interested in obtaining knowledge in securing communication devices/infrastructure. This research
provides a framework that can be used in an organization to eliminate digital anomalies through network
forensics, helps the above mentioned persons to prepare infrastructure readiness for threats and also
enables further research to be carried on in the fields of computer, database, mobile, video, and audio.
The document discusses security mechanisms for spontaneous networks. It begins with an overview of the growth of mobile communications and challenges in configuring services and providing security in spontaneous networks that imitate human relationships. Key management schemes are needed for node authorization and user authentication in mobile ad hoc networks. Existing methods require initial configuration or external authorities. The proposed system aims to reduce dependence on a central authority for re-authentication to avoid possible attacks, increase performance by reducing server utilization, and implement a workload mechanism for efficient server usage.
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...IRJET Journal
This document summarizes a survey on using machine learning techniques in an SDN-based network intrusion detection system. It discusses how SDN allows centralized control and monitoring of network traffic. Machine learning and deep learning can be applied to the monitored traffic to detect anomalies and threats. Specifically, the document examines using long short-term memory neural networks and artificial neural networks to classify traffic and improve detection accuracy in the SDN environment. The goal is to increase the effectiveness of the network intrusion detection system at identifying security issues.
This document summarizes a research paper that proposes a methodology to improve source location privacy preservation in wireless sensor networks. The paper introduces the concept of "interval indistinguishability" to quantify anonymity. It maps the problem of breaching source anonymity to the statistical problem of binary hypothesis testing with nuisance parameters. The paper proposes modeling anonymity, describes the network and adversarial models, and reviews related work before introducing its methodology. The methodology aims to address issues with existing solutions and practically prove the efficiency of improving source location privacy through a modified statistical framework.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
The document summarizes a presentation on research challenges in networked systems. It discusses recommendations from an evaluation of ICT research in Norway, including better aligning research with industry needs. It looks back at topics from 2000 like wireless sensor networks and voice over IP. Potential future areas discussed include cloud computing, cyber-physical systems, smart grids, and security. The presentation calls for more experimental research, collaboration, and evaluation to address open challenges in these emerging areas.
This document summarizes research on coverage problems in wireless sensor networks in the presence of obstacles. It begins with definitions of key concepts related to sensor network coverage, including different types of coverage problems (point, area, barrier), deployment strategies (deterministic, random), coverage degrees, sensing models, and obstacles. It then reviews several approaches that have been proposed to address coverage problems when obstacles are present in the sensor field, including using computational geometry concepts to handle obstacles. The document concludes by noting that more work is still needed to fully address coverage problems in realistic environments with obstacles.
The document discusses utilizing weight allocation in a term frequency-inverse document frequency (TF-IDF) environment to identify and remove noisy data from social media for improved customer segmentation and targeted advertising. Specifically, it aims to recognize keywords that can help cluster social media users based on demographics and behaviors while eliminating uninfluential data. The approach assigns higher weight to words that frequently appear in a document but rarely in the entire collection compared to common words.
This document analyzes helical compression springs used in the rear suspension of two-wheeled vehicles. It presents analytical calculations and finite element analysis to determine stresses and deflections in springs made of hard carbon steel and chrome vanadium steel with circular and rectangular cross-sections under various loads. The results show that chrome vanadium steel springs have lower deflections than hard carbon steel springs under the same loads. Chrome vanadium steel is also concluded to be a better replacement material due to its lower cost and ability to work efficiently with less maintenance.
The document summarizes research on the temperature dependence of microwave characteristics of an n++np++ silicon IMPATT diode operating in the X band (8-12 GHz) frequency range. As the diode junction temperature increases from 100°C to 220°C, key findings include:
1) The negative microwave resistance and positive series resistance of the diode degrade due to changes in electron/hole ionization rates and drift velocities with rising temperature.
2) The series resistance, which contributes to Joule heating, increases with temperature.
3) Numerical simulations following Gummel-Blue analysis show the negative resistance decreases from -11.65 ohms at 100°C to -8.25 ohms at 200
Challenging Issues and Similarity Measures for Web Document ClusteringIOSR Journals
This document discusses challenging issues and similarity measures for web document clustering. It begins with an introduction to text mining and document clustering. It then reviews related work on similarity approaches and measures. Some key challenging issues in web document clustering are discussed, such as measuring semantic similarity between words and evaluating cluster validity. Various types of similarity measures are also described, including string-based measures like Jaro-Winkler distance and corpus-based measures like latent semantic analysis. The conclusion states that accurate clustering requires a precise definition of similarity between document pairs and discusses different similarity measures that can be used.
Preventing Web-Proxy Based DDoS using Request Sequence Frequency IOSR Journals
This document discusses preventing distributed denial of service (DDoS) attacks that use web proxies. It proposes detecting abnormal request sequences from web proxies by analyzing the frequency of request sequences and comparing it to a web proxy's historical behavioral profile. When abnormal sequences are detected, a "soft-control" approach is used to reshape suspicious sequences rather than rejecting the entire sequence, to avoid impacting legitimate users. A hidden semi-Markov model is used to model the temporal and spatial behavior of web proxy traffic over time. This allows both fine-grained and coarse-grained detection of attacks at the server level, independently of traffic intensity or changing web content.
Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...IOSR Journals
1) The document analyzes stress distribution in a curved structure subjected to uniaxial tension using photoelastic and finite element methods.
2) Photoelasticity is used to experimentally determine stress distribution in models of the curved structure with and without circular and elliptical stress relievers. Finite element analysis is then used to validate the experimental photoelastic results.
3) The study found that an elliptical stress reliever with its major axis normal to the load more effectively reduced stress concentration at the inner boundary of the curved structure compared to a circular stress reliever.
This document summarizes a study that implemented various lean strategies at a furniture manufacturing factory in Bangladesh to improve productivity. The strategies of Single-Minute Exchange of Dies (SMED), Gemba (observing the production process firsthand), and Short Interval Control were utilized. Initial observations found redundant worker tasks, long wait times, and lack of supervision. SMED was applied first by separating setup activities into internal and external tasks. This reduced internal setup activities by converting some to external prep work. Overall, the lean strategies decreased processing times and distances traveled by workers while increasing productivity, output, and profits for the factory.
Development of an Algorithm for 16-Bit WTMIOSR Journals
This document describes the development of an algorithm for a 16-bit Wallace tree multiplier (WTM). It begins with an overview of binary multiplication methods and why the Wallace tree structure is advantageous in reducing propagation delay. The document then discusses improvements made to the basic WTM algorithm, including a new method for generating partial products using fewer logic gates. It presents the design, synthesis and testing of WTM circuits of varying sizes on a Spartan-3E FPGA board. Performance metrics like delay, area, power-delay product and area-delay product are measured and compared to other multipliers. The 16-bit WTM is found to have superior performance to the other multipliers in terms of delay, area and speed.
Core Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver DiseaseIOSR Journals
This study examined the association between nonalcoholic fatty liver disease (NAFLD) and metabolic syndrome (MetS) in Bangladeshi patients. The study included 67 patients diagnosed with NAFLD and 50 healthy controls matched for age and BMI. Results found that NAFLD patients had higher levels of insulin resistance, triglycerides, and central obesity compared to controls. However, no significant association was found between MetS and NAFLD when defined by common diagnostic criteria. Individual components of MetS like dyslipidemia, central obesity, and high postprandial glucose were significantly associated with NAFLD on logistic regression analysis. The study concludes that while various MetS components are linked to NAFLD in
This document summarizes a research paper that designed and implemented a location-based mobile application to provide local information to users. The application allows users to select the type, amount, and region of local information they want to view based on their current or specified location. The application was implemented with secure coding techniques to protect user information and system resources from attacks. Key features included categorizing local information, setting display preferences, and separating server and client modules for increased security.
This document discusses frequency domain control strategies for active filters. It begins by introducing the issues caused by harmonics from non-linear loads and how active power filters can help compensate. It then discusses some common control techniques for active filters including the p-q theory, d-q theory, and hysteresis current control. Simulation results are presented showing the FFT algorithm achieving over 90% compensation of harmonics when used with a shunt active filter under steady state balanced conditions. The document concludes that FFT-based control is effective at compensating harmonics from constant non-linear loads.
This document compares the performance of the OSPF and MPLS protocols using network simulation in OPNET. It describes the key aspects of each protocol and the simulation methodology. The results of the simulation show that OSPF had higher throughput and utilization than MPLS, while MPLS had approximately 50% higher delay. In conclusion, OSPF performed better in terms of throughput and utilization, while MPLS had higher delay.
A Survey on Mobile Forensic for Android SmartphonesIOSR Journals
This document summarizes a survey on mobile forensic tools and techniques for investigating Android smartphones. It begins with an introduction to digital forensics and its application to mobile devices. The typical digital forensic investigation process is outlined as identification, data acquisition/preservation, data recovery, forensic analysis, and presentation of evidence. Android smartphones are described as having risen significantly in the global market. The main components of the Android platform are applications, application framework, libraries, Android runtime, and the Linux kernel. Tools and techniques for Android mobile forensics are compared according to their roles in the investigation process.
Big Data Analysis and Its Scheduling Policy – HadoopIOSR Journals
This document discusses scheduling policies in Hadoop for big data analysis. It describes the default FIFO scheduler in Hadoop as well as alternative schedulers like the Fair Scheduler and Capacity Scheduler. The Fair Scheduler was developed by Facebook to allocate resources fairly between jobs by assigning them to pools with minimum guaranteed capacities. The Capacity Scheduler allows multiple tenants to securely share a large cluster while giving each organization capacity guarantees. It also supports hierarchical queues to prioritize sharing unused resources within an organization.
This document discusses automatic detection of microaneurysms in digital fundus images using local region entropy (LRE). It proposes a computer-based system for automatically detecting diabetic retinopathy in fundus images using an SVM classifier. The system achieves 95.38% accuracy, 94% sensitivity, and 94.7% specificity when tested on the DIARETDB1 dataset containing 89 images. Diabetic retinopathy occurs when high blood sugar damages the blood vessels in the retina and can lead to vision loss or blindness if left untreated. The proposed system would help reduce the workload of ophthalmologists by automatically analyzing fundus images to detect signs of the disease.
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...IOSR Journals
The document discusses crack detection in beams using the Hilbert-Huang transform (HHT). It first provides background on using vibration-based methods to detect structural damage. It then describes modeling a cracked beam using finite element analysis, representing the crack as a rotational spring. Vibration analysis is performed on simply supported, fixed-fixed, free-free, and cantilever beams with cracks. HHT is applied to the transformed response to determine crack location based on changes in spatial variation. Both analytical and experimental results show good agreement with the model and that HHT is effective for analysis.
This document describes using particle swarm optimization (PSO) to detect defective elements in a spaceborne planar antenna array. PSO is an optimization technique that models social behavior to iteratively find the global minimum of a cost function. Here, PSO is used to minimize the difference between measured and expected far-field radiation patterns to determine the location of any defective array elements. The document outlines designing a 2x2 planar array in IE3D software, introducing defects, calculating error patterns, and using PSO to optimize element positions to minimize error and correctly identify defective elements based only on far-field power measurements. The technique is shown to successfully detect randomly defective elements in the array, making it useful for locating failures in space applications where
This document describes the design and fabrication of a kids bike. It provides details on the construction process, including fitting the rear sprocket, mounting the engine to the frame, installing the throttle, attaching the clutch lever, mounting the fuel tank, and securing the coil. The overall goal of the project was to create a low-cost bike for kids that reduces human effort during riding, especially in difficult conditions, making the ride more effortless and comfortable.
This document presents a new randomized visual cryptography scheme for sharing color images. The scheme uses (n-1) natural images and one noise-like share image to encrypt a color secret image. The encryption process extracts features from the natural images without altering them. When decryption is performed using the share image and extracted natural image features, the secret image can be recovered without distortion. The proposed approach avoids pixel expansion and allows secret images to be recovered by stacking shares while maintaining security. Experimental results demonstrate encrypting a secret image using three natural images and recovering it without error. The scheme can encrypt images of variable sizes and overcomes limitations of previous methods.
This hybrid evolutionary optimization model combines genetic algorithm and simulated annealing to solve job shop scheduling problems. It initializes a population of solutions and then iterates through generations. In each generation, genetic operations like crossover and mutation are applied to perturb the solutions. The new solutions are evaluated and sorted by fitness. The best solution is then accepted or replaced using a simulated annealing mechanism that considers solution quality and temperature parameter. This allows acceptance of worse solutions to avoid local optima. The process repeats with temperature reduction until termination. The model is proposed to improve on genetic algorithm alone by incorporating simulated annealing's ability to escape local optima.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATACSEIJJournal
Wireless sensor networks are continually developing in the big data world and are widely employed in
many aspects of life. In the monitoring region, the WSN gathers, analyses, and sends information about the
detected item. In recent years, WSN has also made important strides in the management of critical data
protection, traffic monitoring, and climate - change detection. The rich big data contributors known as
wireless sensor networks provide a significant amount of data from numerous sensor nodes in large-scale
networks (WSNs), which are among the numerous potential datasets. However, unlike traditional wireless
networks, suffer from significant constraints in communication and data dependability due to the cluster’s
constraints. This paper gives a detailed assessment of cutting-edge research on using WSN into large data
systems Potential network and effective deployment and scientific problems are presented and discussed in
the context of the study topics and aim. Finally, unresolved issues are addressed in order to discuss
interesting future research possibilities.
Systems using Wireless Sensor Networks for Big Datacivejjour
(1) Wireless sensor networks are being increasingly used in big data systems to gather and transmit large amounts of data from numerous sensor nodes. However, WSNs face constraints like limited communication bandwidth and power that make them unsuitable for traditional big data architectures.
(2) The document discusses challenges of integrating WSNs into big data systems and outlines several unresolved issues including lack of compatibility between different IoT devices, mobility of sensors, supporting real-time communications, and addressing security and privacy concerns with increased connectivity and data volumes.
(3) It analyzes recent research that has evaluated WSN properties and protocols for big data. However, issues around individuality, cooperation, mobility, fog computing, delays, security
Systems using Wireless Sensor Networks for Big DataCSEIJJournal
Wireless sensor networks are continually developing in the big data world and are widely employed in
many aspects of life. In the monitoring region, the WSN gathers, analyses, and sends information about the
detected item. In recent years, WSN has also made important strides in the management of critical data
protection, traffic monitoring, and climate - change detection. The rich big data contributors known as
wireless sensor networks provide a significant amount of data from numerous sensor nodes in large-scale
networks (WSNs), which are among the numerous potential datasets. However, unlike traditional wireless
networks, suffer from significant constraints in communication and data dependability due to the cluster’s
constraints. This paper gives a detailed assessment of cutting-edge research on using WSN into large data
systems Potential network and effective deployment and scientific problems are presented and discussed in
the context of the study topics and aim. Finally, unresolved issues are addressed in order to discuss
interesting future research possibilities.
Design Issues and Applications of Wireless Sensor Networkijtsrd
Efficient design and implementation of wireless sensor networks has become a hot area of research in recent years, due to the vast potential of sensor networks to enable applications that connect the physical world to the virtual world. By networking large numbers of tiny sensor nodes, it is possible to obtain data about physical phenomena that was difficult or impossible to obtain in more conventional ways. In future as advances in micro-fabrication technology allow the cost of manufacturing sensor nodes to continue to drop, increasing deployments of wireless sensor networks are expected, with the networks eventually growing to large numbers of nodes.Potential applications for such large-scale wireless sensor networks exist in a variety of fields, including medical monitoring, environmental monitoring, surveillance, home security, military operations, and industrial machine monitoring etc. G. Swarnalatha | R. Srilalitha"Design Issues and Applications of Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4688.pdf http://www.ijtsrd.com/engineering/computer-engineering/4688/design-issues-and-applications-of-wireless-sensor-network/g-swarnalatha
This document summarizes a paper on the challenges of wireless sensor networks, with a focus on time synchronization issues. It discusses how wireless sensor networks face many constraints including limited energy, bandwidth, and resources. It also outlines various challenges such as security, deployment, and design constraints. The document then discusses the importance of time synchronization for applications requiring coordination between sensor nodes. It describes issues that can cause clocks to drift like clock skew. It also analyzes different communication methods and synchronization protocols for wireless sensor networks, comparing their advantages and disadvantages.
Human: Thank you, that is a concise 3 sentence summary that captures the key aspects of the document.
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
The document summarizes a research study on wireless sensor networks (WSNs). It discusses WSNs applications in various fields like military, environment, healthcare, homes, and traffic control. It also examines key challenges in WSNs like energy consumption, data reporting models, and security issues. Additionally, the document reviews common simulation platforms used to test WSN protocols and evaluates their features, interfaces, support, scalability and availability of WSN modules.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...cscpconf
In today’s era Wireless sensor networks (WSNs) have emerged as a solution for a wide range of
applications. Most of the traditional WSN architectures consist of static nodes which are densely deployed
over a sensing area. Recently, several WSN architectures based on mobile elements (MEs) have been
proposed. Most of them exploit mobility to address the problem of data collection in WSNs. The common
drawback among them is to data sharing between interconnected nodes. In this paper we propose an
Efficient Approach for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink. Our
algorithm is divided into seven parts: Registration Phase, Authentication Phase, Request and Reply Phase,
Setup Phase, Setup Phase (NN), Data Gathering, and Forwarding to Sink. Our approach provides an
efficient way to handle data in between the intercommunication nodes. By the above approach we can
access the data from the node which is not in the list, by sharing the data from the node which is
approachable to the desired node. For accessing and sharing we need some security so that the data can
be shared between authenticated nodes. For this we use two way security approach one for the accessing
node and other for the sharing.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
This document provides an overview of wireless sensor networks, including their basic components, applications, and technical considerations. It discusses the key elements of sensor networks such as sensors, interconnecting networks, data clustering points, and computing resources. It also covers sensor types, network architectures, communication protocols, applications such as environmental monitoring and smart spaces, and challenges around power efficiency and scalability.
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSijasuc
With a widespread growth in the potential applications of Wireless Sensor Networks, the need for reliable
security mechanisms for them has increased manifold. This paper proposes a scheme, Privacy for Police
Patrols (PPP), to provide secure data aggregation that relies on multilevel routing. Privacy factors have
been identified and implemented. Aggregates are prepared and the summary of information is gathered
and stored in a repository. The above defined approaches are integrated in police patrol applications and
preliminary results are obtained.
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
Wireless sensor network (WSN) is the network of hundreds and thousands of micro-sensor nodes,
connecting each other by a wireless medium.WSN provide reliable sensing of the environment, detecting
and reporting events to the sink. One of the most important constraints of WSN is energy consumption.
Since the micro sensors are small in dimension, batteries are necessary to produce power to the network. In
this paper, we have proposed an algorithm for hierarchy based protocols of wireless sensor networks,
which consist of two groups of sensor nodes in a single cluster node. Each cluster consists of a three cluster
head. The event driven data sensing mechanism is used in this paper and this sensed data is transmitted to
the master section head. The gathered data is transmitted to the sink via mobile agent. Hence efficient way
of data transmission is possible with larger group of nodes. In this approach of using hierarchy based
protocols; the lifetime of the sensor network is increased. This paper proposes an innovative approach of
cluster head election. The results are compared with LEACH protocol and proved to be energy efficient.
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
This document discusses using mobile sensors to improve target coverage and network connectivity in wireless sensor networks. It first defines key concepts in mobile wireless sensor networks like coverage, connectivity, and network lifetime. It then reviews existing literature on algorithms for mobile sensor deployment to optimize target coverage and network connectivity with minimum movement. The proposed method aims to deploy mobile sensors with no movement needed to achieve both target coverage and network connectivity. The goal is to minimize energy consumption from sensor movement.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
Wireless sensor networks are harshly restricted by storage capacity, energy and computing power. Wireless Sensor Networks have acquired a lot of attention by research community, manufacturer as well as actual users for monitoring remote trades and how to gather data in different environment. The wireless sensor nodes are especially battery powered devices having life can be extended for some times while long lasting and reliable for maintaining consumption of energy and network lifetime while designs applications and protocols. So it is essential to design effective and energy efficient protocol in order to enhance the network lifetime. In this paper we present the study of different energy efficient communication protocols of Wireless Sensor Networks (WSNs).Then some of the communication protocols which are widely used in WSNs to improve network performance are also discussed advantages and disadvantages of each protocols.
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
This document discusses an improved enhanced real-time routing protocol (IERT) for mobile wireless sensor networks. The protocol aims to increase network lifetime by using a backup coordinator node if the primary coordinator fails. It also uses a corona-based routing structure to reduce routing holes and increase throughput. The protocol is simulated using NS2 and is shown to increase network lifetime by 30% compared to the previous ERTLD protocol, while also achieving lower delays and higher delivery rates. It provides improvements over real-time routing protocols for wireless sensor networks.
Similar to Issues and Challenges in Distributed Sensor Networks- A Review (20)
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
We have designed & manufacture the Lubi Valves LBF series type of Butterfly Valves for General Utility Water applications as well as for HVAC applications.
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...IJCNCJournal
Paper Title
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications
Authors
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Abstract
Non-Orthogonal Multiple Access (NOMA) helps to overcome various difficulties in future technology wireless communications. NOMA, when utilized with millimeter wave multiple-input multiple-output (MIMO) systems, channel estimation becomes extremely difficult. For reaping the benefits of the NOMA and mm-Wave combination, effective channel estimation is required. In this paper, we propose an enhanced particle swarm optimization based long short-term memory estimator network (PSOLSTMEstNet), which is a neural network model that can be employed to forecast the bandwidth required in the mm-Wave MIMO network. The prime advantage of the LSTM is that it has the capability of dynamically adapting to the functioning pattern of fluctuating channel state. The LSTM stage with adaptive coding and modulation enhances the BER.PSO algorithm is employed to optimize input weights of LSTM network. The modified algorithm splits the power by channel condition of every single user. Participants will be first sorted into distinct groups depending upon respective channel conditions, using a hybrid beamforming approach. The network characteristics are fine-estimated using PSO-LSTMEstNet after a rough approximation of channels parameters derived from the received data.
Keywords
Signal to Noise Ratio (SNR), Bit Error Rate (BER), mm-Wave, MIMO, NOMA, deep learning, optimization.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL:https://aircconline.com/abstract/ijcnc/v14n5/14522cnc05.html
Pdf URL: https://aircconline.com/ijcnc/V14N5/14522cnc05.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfBalvir Singh
Sri Guru Hargobind Ji (19 June 1595 - 3 March 1644) is revered as the Sixth Nanak.
• On 25 May 1606 Guru Arjan nominated his son Sri Hargobind Ji as his successor. Shortly
afterwards, Guru Arjan was arrested, tortured and killed by order of the Mogul Emperor
Jahangir.
• Guru Hargobind's succession ceremony took place on 24 June 1606. He was barely
eleven years old when he became 6th Guru.
• As ordered by Guru Arjan Dev Ji, he put on two swords, one indicated his spiritual
authority (PIRI) and the other, his temporal authority (MIRI). He thus for the first time
initiated military tradition in the Sikh faith to resist religious persecution, protect
people’s freedom and independence to practice religion by choice. He transformed
Sikhs to be Saints and Soldier.
• He had a long tenure as Guru, lasting 37 years, 9 months and 3 days
Issues and Challenges in Distributed Sensor Networks- A Review
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. III (Jan – Feb. 2015), PP 34-42
www.iosrjournals.org
DOI: 10.9790/0661-17133442 www.iosrjournals.org 34 | Page
Issues and Challenges in Distributed Sensor Networks- A Review
Sharada Y Yalavigi, Dr. Krishnamurthy G.N, Dr. NandiniSidnal
Abstract:Distributed Sensor networks (DSN) is an emerging technology and have great potential to be
employed in critical situations like battlefields and commercial applications such as process management,
health care monitoring, environmental/earth sensing, industrial monitoring and many more scenarios. One of
the major challenges distributed sensor networks face today is security. While the deployment of sensor nodes in
an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power
and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing
technology combined with processing power and wireless communication makes it profitable for being exploited
in great quantity in future. The wireless communication technology also acquires various types of security
threats. This paper discusses a wide variety of security, research, computational and design issues along with
the challenges faced.
Keywords: Distributed Sensor Network, Design issues, Security issues, Defensive mechanisms, Challenges.
I. Introduction
A Distributed Sensor Network can be defined as a set of spatially scattered intelligent sensors designed
to obtain measurement from the environment, abstract relevant information from the data gathered, and to derive
appropriate interferences from the information gained. Typical examples include temperature, light, sound, and
humidity. These sensor readings are transmitted over a wireless channel to a running application that makes
decisions based on these sensor readings. Many applications have been proposed for distributed sensor
networks, and many of these applications have specific quality of service (QoS) requirements that offer
additional challenges to the application designer.[18],[19].
We consider two aspects [8] to motivate an application-based viewpoint: First, what aspects of wireless
sensors make the implementation of applications more challenging, or at least different?
One widely recognized issue is the limited power available to each wireless sensor node, but other
challenges such as limited storage or processing capabilities play a significant role in constraining the
application development. Second, what services are required for a wireless sensor network application toachieve
its intended purpose? A number of widely applicable services, such as time synchronization andlocation
determination are briefly discussed. Other services are needed to support database requirements, such as
message routing, topology management, and data aggregation and storage.In this paper we discuss a wide
variety of security, research, computational and design issues along with the challenges faced.
II. Design Issues And Challenges In Sensor Networks
Several design challenges [4],[5],[16],[20],[21]present themselves to designers of wireless sensor
networkapplications. The limited resources available to individual sensor nodesimplies designers must develop
highlydistributed, fault-tolerant, and energyefficientapplications in a small memory-footprint. For wireless
sensor network applications to have reasonable longevity, an aggressiveenergy-management policy is
mandatory. This is currently the greatest designchallenge in any wireless sensor network application. Several
key differences between more traditional ad hoc networks and wirelesssensor networks exist. [8]
1) Individual nodes in a wireless sensor network have limited computationalpower and storage capacity. They
operate on nonrenewable power sourcesand employ a short-range transceiver to send and receive messages.
2) The number of nodes in a wireless sensor network can be several orders of magnitudehigher than in an ad
hoc network. Thus, algorithm scalability is animportant design criterion for sensor network applications.
3) Sensor nodes are generally densely deployed in the area of interest. This densedeployment can be leveraged
by the application, since nodes in close proximitycan collaborate locally prior to relaying information back
to the base station.
4) Sensor networks are prone to frequent topology changes. This is due to severalreasons, such as hardware
failure, depleted batteries, intermittent radio interference,environmental factors, or the addition of sensor
nodes. As a result,applications require a degree of inherent fault tolerance and the ability toreconfigure
themselves as the network topology evolves over time.
5) Wireless sensor networks do not employ a point-to-point communication paradigmbecause they are usually
not aware of the entire size of the network andnodes are not uniquely identifiable. Consequently, it is not
possible to individuallyaddress a specific node. Paradigms, such as directed diffusion [,], employa data-
2. Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 35 | Page
centric view of generated sensor data. They identify informationproduced by the sensor network as
<attribute, value> pairs. Nodes requestdata by disseminating interests for this named data throughout the
network.Data that matches the criterion are relayed back toward the querying node.
Even with the limitations individual sensor nodes possess and the designchallenges application developers face,
several advantages exist for instrumentingan area with a wireless sensor network:[8]
1) Due to the dense deployment of a greater number of nodes, a higher level offault tolerance is achievable in
wireless sensor networks.
2) Coverage of a large area is possible through the union of coverage of severalsmall sensors.
3) Coverage of a particular area and terrain can be shaped as needed to overcomeany potential barriers or holes
in the area under observation.
4) It is possible to incrementally extend coverage of the observed area and densityby deploying additional
sensor nodes within the region of interest.
5) An improvement in sensing quality is achieved by combining multiple,independent sensor readings. Local
collaboration between nearby sensornodes achieves a higher level of confidence in observed phenomena.
6) Since nodes are deployed in close proximity to the sensed event, this overcomesany ambient environmental
factors that might otherwise interfere withobservation of the desired phenomenon.
2.1 Data Aggregation:
Redundancy exists in sensordata in both the temporal and spatial domains. That is, readings collected
by asingle sensor at different times or among neighboring sensors may be highlycorrelated, and contain
redundant information. Instead of transmitting all thehighly correlated information to subscribers, it may be
more effective forsome intermediate sensor node(s) to digest the information received andcome up with a
concise digest, in order to reduce the amount of raw data tobe transmitted (and hence the power incurred, and
bandwidth consumed, intransmission). This technique is termed as dataaggregation (also called data
fusion).Data fusion can also be integrated with routing. Compared withtraditional address-centric routing, which
finds the shortest paths betweenpairs of end nodes, data-fusion–centric routing aims to locate routes thatlead to
the largest degree of data aggregation [41].
Theaggregation typically follows a tree topology rooted at thesink. Each leaf node would deliver its
collected data to itsparent node. Intermediate sensor nodes of the tree mayoptionally perform certain operations
(e.g., sum, maximum, minimum, mean, etc.) on the received data and forward theresult. Because the wireless
medium is shared, transmissionsto forward the data need to be coordinated in orderto reduce interference and
avoid collision. The fundamentalchallenge can be stated as: How can the aggregation transmissionsbe scheduled
in a wireless sensor network suchthat no collision may occur and the total number of timeslots used (referred to
as aggregation latency) is minimized?This is known as the Minimum-Latency Aggregation Scheduling(MLAS)
problem in the literature.The MLAS problem is typically approached in two steps:(i) data aggregation tree
construction and (ii) link transmissionscheduling. For (ii), we assume the simplest modein which every non-leaf
node in the tree will make onlyone transmission, after all the data from its child nodeshave been received. A
correct solution to the MLAS problemrequires that no concurrent transmissions interfering witheach other
should take place. If steps (i) and (ii) are carriedout simultaneously in a solution, we have a „„joint‟‟ design.
2.2 Time Synchronization
Sensor networks are used to monitor real-world phenomena. For such monitoringapplications, physical
time often plays a crucial role. For example,the times of occurrence of physical events are often crucial for the
observer to associate event reports with the originating physical events. Also, methods for localization of sensor
nodes based on the measurement of time of flight or difference of arrival time of certain signals also require
synchronized time. Providing synchronized physical time is a complex task dueto various challenging
characteristics of sensor networks like energy and other resources, network dynamics, infrastructure and
configuration.[17],[37].
Different applications like beam- forming array, data aggregation, recognition of duplicate detection of
same event from different sensors, ordering of logged events have different synchronization requirements and
also any single synchronization mechanism is not appropriate for all circumstances sensors should have multiple
methods available to them so that they can dynamically trade precision for energy, or scope for convergence
time. Existing time synchronization methods like NTP conserve use of bandwidth and try to keep the clock
synchronization at all times but are not aware of the stringent energy constraints and the heterogeneity of the
hardware that may be deployed in sensornets.
3. Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 36 | Page
2.3 Localization
In emerging sensor network applications it is necessary to accurately orient the nodes with respect to a
global coordinate system in order to report data that is geographically meaningful. Furthermore, basic middle
ware services such as routing often rely on location information (e.g., geographic routing). Application contexts
and potential massive scale make it unrealistic to rely on careful placement or uniform arrangement of sensors.
Rather than use globally accessible beacons or expensive GPS to localize each sensor, we would like the sensors
to self-organize a coordinate system.
Some of the design goals of localization in wireless sensor networks are:
RF-based: Normally, the sensors have some kind of short-range radio transceivers for communication. By
leveraging this radio for localization the high cost and size requirements of GPS can be avoided.
Receiver-based: For greater scalability, the responsibility for localization must lie with the receiving node
that needs to be localized and not with the reference points.
Ad Hoc: For easy deployment, the solution should not require preplanning or extensive infrastructure.
Low Energy: Since the sensors have modest processing capabilities, the mechanisms should minimize
computation and message costs to reduce power consumption.
Adaptive Fidelity: The accuracy of the localization algorithms should be adaptive to the granularity of
available reference points.
Localization methods typically rely on some form of communication between reference points with
known positions and the receiver node that needs to be located. Various localization techniques can be classified
into two broad categories based on the granularity of information inferred during the communication. Fine-
grained localization systems (e.g., GPS) provide high precision location information, typically estimated ranges
or angles relative to beacons (reference points) and compute location of the unknown node using trilateration
(position estimation from distance to three points) or triangulation (position estimation from angles to three
points). Coarse-grained localization systems estimate unknown node location from proximity to beacons or
landmarks
2.4 Node Deployment
Node deployment[11][45] in WSNs is application dependent and affects the performance of the routing
protocol. The deployment can be either deterministic or randomized. In deterministic deployment, the sensors
are manually placed and data is routed through pre-determined paths. However, in random node deployment, the
sensor nodes are scattered randomly creating an infrastructure in an ad hoc manner. If the resultant distribution
of nodes is not uniform, optimal clustering becomes necessary to allow connectivity and enable energy efficient
network operation. Intersensor communication is normally within short transmission ranges due to energy and
bandwidth limitations. Therefore, it is most likely that a route will consist of multiple wireless hops.
2.5 Network Dynamics
Most of the network architectures assume that sensor nodes are stationary. However, mobility of both
BS‟s and sensor nodes is sometimes necessary in many applications. Routing messages from or to moving nodes
is more challenging since route stability becomes an important issue, in addition to energy, bandwidth etc.
Moreover, the sensed phenomenon can be either dynamic or static depending on the application, e.g., it is
dynamic in a target detection/tracking application, while it is static in forest monitoring for early fire prevention.
Monitoring static events allows the network to work in a reactive mode, simply generating traffic when
reporting. Dynamic events in most applications require periodic reporting and consequently generate significant
traffic to be routed to the BS [12].
2.6 Energy Efficiency
Once the WSN is functional it becomes difficultto replace or recharge the battery of sensor nodes. This
further posesthe challenge to maintain sensors in hostile and harsh environmentand scaling of sensor network to
hundreds or thousands of nodes.Therefore, an energy-efficient mechanism is required to save energyand prolong
the network lifetime [12].
2.7 Node/Link Heterogeneity
In many studies, all sensor nodes wereassumed to be homogeneous, i.e., having equal capacity in terms
ofcomputation, communication, and power. However, depending onthe application a sensor node can have
different role or capability.The existence of heterogeneous set of sensors raises many technicalissues related to
data routing. These special sensors can be eitherdeployed independently or the different functionalities can
beincluded in the same sensor nodes. Even data reading and reportingcan be generated from these sensors at
different rates, subject todiverse quality of service constraints, and can follow multiple datareporting models.
4. Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 37 | Page
For example, hierarchical protocols designate acluster-head (CH) node different from the normal sensors.
Thesecluster heads can be chosen from the deployed sensors or can bemore powerful than other sensor nodes in
terms of energy, bandwidth,and memory. Hence, the burden of transmission to the BS is handledby the set of
cluster-heads [12].
2.8 Fault tolerance and reliability
For many WSN applications, datamust be delivered reliably over the noisy, error-prone, and
timevaryingwireless channel. In such cases, data verification andcorrection on each layer of the network are
critical to provide accurate results. Additionally, sensor nodes are expected to performself-testing, self-
calibrating, self-repair and self-recovery proceduresduring their lifetime.
2.9 Scalability
Sensor networks should be scalable or flexible. Sensor networks dynamically adopt changes in node
density and topology. Sometimes few nodes are added to the sensor networks existed nodes for the purpose of
coverage issue. So sensor network is flexible to adapt these changes.
2.10 Data Centric Routing
In data-centric routing protocol, whenever a sink requires any data it sends a query message to the
different part of the sensor network field. After receiving this query message sensors node replies and sends data
to the sink. In data-centric protocol attribute based naming is used which specifies the properties of the data.
III. Security Issues And Challenges In Dsn
3.1 Security Requirements [2]-[6],[13][14][42]:
1) Availability
Availability determines whether a node has the ability touse the resources and whether the network is
available forthe messages to communicate. However, failure of thebase station will eventuallythreaten the entire
sensor network. Thus availability is ofprimary importance for maintaining an operationalnetwork.
2) Authentication
Authentication ensures the reliability of the message byidentifying its origin. Attacks in sensor
networks do notjust involve the alteration of packets; adversaries can alsoinject additional false packets []. Data
authenticationverifies the identity of the senders and receivers. Dataauthentication is achieved through
symmetric orasymmetric mechanisms where sending and receivingnodes share secret keys. Due to the wireless
nature of themedia and the unattended nature of sensor networks, it isextremely challenging to ensure
authentication.
3) Confidentiality
Confidentiality is the ability to conceal messages froma passive attacker so that any message
communicated viathe sensor network remains confidential. This is the mostimportant issue in network security.
A sensor node shouldnot reveal its data to the neighbors.
4) Integrity
Data integrity in sensor networks is needed to ensurethe reliability of the data and refers to the ability
toconfirm that a message has not been tampered with, altered or changed. Even if the network has
confidentialitymeasures, there is still a possibility that the data integrityhas been compromised by alterations.
The integrity of thenetwork will be in trouble when:
• A malicious node present in the network injectsfalse data.
• Unstable conditions due to wireless channel causedamage or loss of data. [4]
5) Data Freshness
Even if confidentiality and data integrity are assured, thereis a need to ensure the freshness of each
message.Informally, data freshness [] suggests that the data isrecent, and it ensures that no old messages have
beenreplayed. To solve this problem a nonce, or another time related counter, can be added into the packet to
ensure data freshness
3.2 Security Attacks:
Attackers can be classified into two types: i) external attackers that are not authorized participants of
the sensor network and ii) internal attackers that have compromised a legitimate sensor and use it to launch
attacks in the network.Furthermore, attackers can be classified into passive and active. Passive attackers monitor
5. Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 38 | Page
network traffic without interfering with it. Their aim is to eavesdrop on the exchanged information and to
acquire private data or to infer about information-sensitive applications that execute in the sensors. Active
attackers disrupt network operation by launching several types of attacks that cause DoS (denial of service) in
the DSN.
1) Denial of Service (DoS)
A Denial of Service attack in sensor networks in general is defined as any event that eliminates the
network‟s capacity to perform its desired function. DoS attacks in distributed sensor networks may be carried
out at different layers like the physical, link, network and transport layers. This occurs by the unintentional
failure of sensor nodes. The simplest DoS attack tries to exhaust the resources available to the victim node, by
transmitting additional unwanted packets and thus prevents legitimate sensor network users from tapping work
or resources to which these nodes are deployed. In DSNs, several types of Denial of Service attacks in different
layers might be performed, i.e. at physical layer, the Denial of Service attacks could be jamming and tampering,
at link layer, collision, exhaustion, unfairness, at network layer, neglect and greed, homing, misdirection, black
holes and at transport layer this attack could be performed by malicious flooding and resynchronizations.
2) Spoofed, altered or replay of routing information
The most outstanding attack on routing is to alter, spoof, or just replay routing information and it is
known as false routing information.Malicious nodes simply drop data packets quietly, modify the data content,
generate false error messages or redirects the traffic.[17]
3) Selective forwarding
In this attack an attacker comprise itself in a data stream lane and can selectivelydrop only distinct
packets. In sensor networks it is assumed that nodes faithfully forward received messages butsome
compromised node might refuse to forward packets, though neighbors may start using another route.
4) Sinkhole attacks
The main goal of an adversary in sinkhole attack is to attract all the traffic toward itselfthrough an
agreement node. Sinkhole attacks [10] typically work by making a compromised node look especiallyattractive
to surrounding nodes.
5) Sybil attacks
In Sybil attack [10], a single node makes replicas of it and distributes it in multiple locations of
thenetwork. Authentication and encryption techniques can prevent an outsider to launch a Sybil attack on
thesensor network.
6) Wormhole attacks
In wormhole attack, more than two malicious colluding sensor nodes does a virtual tunnel in the sensor
network, which is used to forward message packets between the tunnel edge points. This tunnel establishes
shorter links in the network. In which adversary documents forwards packets at one location in the sensor
network, tunnels them to different location, and re-forwards them into the sensor network. In sensor network
when sender node sends a message to another receiver node in the network, then the receiving node tries to send
the message to its neighboring nodes. The neighbor sensor nodes assume that the message was sent by the
sender node (this is normally out of range), so they tries to forward the message to the originating node, but this
message never comes because it is too far away. Wormhole attack is a great threat to sensor networks since, this
type of attack will not require compromising a sensor in the network instead; it could be performed even at the
starting phase during the sensors initializes to identify its neighboring information. This Wormhole attacks are
very difficult to stop since routing information given by a sensor node is very difficult to check. The wormhole
attack is possible even when the attacker has not compromised with any hosts nodes and even if all
communication provides confidentiality and are authenticated also.
7) Hello flood attack
In this, HELLO packets will have high radio transmission range and these are used as weapons in DSN.
This processing power sends HELLO packets to a number of sensor nodes, which are deployed, in a large area
within a Sensor Network. The sensor devices are thus persuaded that the adversary is their neighboring node. As
a result of this, while forwarding the messages to the base station, the victim sensor nodes try to go through the
attacker as they are aware, that it is their neighborers and are spoofed by the attacker.[17]
6. Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 39 | Page
8) Acknowledgement spoofing
The routing algorithm of a number of sensor networks depends on the explicit or implicit
acknowledgement from the link layer. Because of this innate medium of broadcast medium, the attacker can be
spoofing the acknowledgement from the link layer for sniffed packets that are meant for adjacent nodes. The
aim of this attack is to make the sender nodes believe that the receiving node is in vicinity or even that a
disabled/dead node is still alive.
IV. Measures To Overcome Issues And Challenges In Distributed Sensor Networks:
Table1: Various design issues and challenges and their requirements
Issue/Challenge Requirements
Data Aggregation [41] Energy efficient and low delay
Time Synchronization [37] Rapid flooding, keeping track of neighboring nodes, overhead in
terms of computation and memory allocation.
Localization [48] Flooding, power consumption, number of anchors required for
accurate localization
Node Deployment [45] Energy and bandwidth limitations
Network Dynamics
Node/Link Heterogeneity [12][45]
Route stability, energy, and bandwidth.
Data routing issues.
Energy Efficiency [44][47] MAC Scheduler, Data reduction, sleep/wake-up schemes, radio
optimization and energy efficient routing.
Fault tolerance and reliability [12] Reliability requirements: Noise-free, error-free, time-invariant
wireless channel, error control, error detection and error correction
techniques.Sensor nodes are expected to performself-testing, self-
calibrating, self-repair and self-recovery proceduresduring their
lifetime.
Fault tolerance can be achieved with the help of redundant nodes.
Data Centric Routing [49][50] Energy efficiency
Scalability Topology control mechanisms
Security Requirements [4]
Availability
Availability of resources and base station
Authentication Authentication techniques like MAC (Message Authentication code)
Confidentiality Encryption techniques
Integrity Encryption techniques
Data Freshness a nonce, or another time-related counter, can be added into the
packet to ensure data freshness.
Table2: Various security attacks and their countermeasures
Type of attack OSI layer Characteristic[26][28] Countermeasures
Denial of Service
(DoS)[31]
Physical layer Jamming,Tampering Frequency hopping [2],[15], UWB(Ultra Wide
Band) transmission technique, Changing and
Protecting the key.JAM (Avoidance of
jammed region by using coalesced neighbor
nodes),Wormhole based (Uses wormholes to
avoid jamming) [3][32]
Link layer Collision, Exhaustion, Unfairness Time diversity and CRC [2][15], protecting
the Network ID along with any information
required for device joining [15].
Error correction code, rate limitation,small
frames [6]
Network layer Neglect and greed, homing,
misdirection, black holes.[31]
Restricting malicious node to join the network
by secure network set up phase, REWARD
routing protocol(Uses geographic routing,
Takes advantage of the broadcastinter-radio
behavior to watch neighbor transmissions and
detectblackhole attacks)[2],[36]
Transport layer Flooding and de-synchronization Limit the number of connections that an entity
can make. Authenticating all the packets
exchanged between sensor nodes along with
all the control fields in transport header. The
adversary cannot spoof the packets and header
and thus this attack can be prevented.[2],[17]
Client puzzles, Authentication [6],[38]
Spoofed, altered or
replay of routing
information
Link layer Malicious nodes simply drop data
packets, modify the data content,
generate false error messages or
redirects the traffic.
Authentication [2][15], On Communication
Security (Efficient resource management,
Protects the network even if partof the
network is compromised) [3]
Selective forwarding
[40]
Network layer Attackers drop packets they have
to route
Multipath routing, CHEMAS (Checkpoint-
based Multi-hop Acknowledgement Scheme),
a lightweight security scheme for detecting
selective forwarding attacks. This scheme
7. Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 40 | Page
randomly selects a number of intermediate
nodes as checkpoints which are responsible
for generating acknowledgement. According
to this scheme, along a forwarding path, if a
checkpoint node does not receive enough
acknowledgements from the downstream
checkpoint nodes it can detect abnormal
packet loss and identify suspect nodes.
Sinkhole attacks Link
layer,Network
layer
Attacker broadcasts false routing
related information so
thatneighboring nodes send them
their packets and stealsinformation
or drops them
Data consistency& Network flow information
approach, Hop count Monitoring Scheme,
RSSI based Scheme,Monitoring nodes CPU
Usage, Mobile Agent based approach ,Using
Message Digest Algorithm.[15][35]
Sybil attacks Physical layer Node replication by stealing
sensors identities, that is, MAC
address, IP address, and so forth
Physically Protecting the devices [15]
Data link layer Changing the key regularly [15], key
management [9]
Network layer Reset the devices and change the session keys,
Suspicious node detection bysignal strength
Wormhole attacks
[30][31]
Link layer Adversaries exchange packets
through a long-distance andlow-
latency links affecting routing
making legitimate sensors
believe that they are neighbors
with sensors of another area
Packet leashes, directional antenna, Network
Neighbor Number (NNT) Test based on
Hypothesis testing which detects the increase
in the number of neighbors of the sensors, All
Distance Test (ADT), detects the decrease of
the lengths of the shortest paths between all
pairs of sensors.[15]
Network layer
Hello flood attack Network layer Use of high transmission range
HELLO packets so that nodes go
through attacker while transmitting
packets to base station
“Identity verification protocol”[39] checks the
bi-directionality of link with encrypted echo-
back mechanism. A “probabilistic based”
proposal, which drives some randomly chosen
nodes to
acknowledge to base station regarding hello
requests, which then further examines the
request authenticity
Acknowledgement
spoofing
Link layer Spoofs the acknowledgement for
the sniffed packets and gives an
illusion that receiver is in its
vicinity and even disabled/dead
node is alive
Good encryption techniques and proper
authentication for communication.[32]
V. Conclusion
In this paper, we have addressed various design issues in distributed sensor networks and also
challenges faced.Security requirements, attacks and countermeasures are also discussed. Drawbacks and
requirements associated with countermeasures presents open research issues and researchers can work in that
direction for designing secure protocols.
References
[1]. Edwin Prem, Kumar Gilbert, BaskaranKaliaperumal, and Elijah Blessing Rajsingh“Research Issues in Wireless Sensor
NetworkApplications: A Survey”DOI: 10.7763/IJIEE.2012.V2.191
[2]. MahfuzulhoqChowdhury, MdFazlul Kader and Asaduzzaman” Security Issues in Wireless Sensor Networks: A
Survey”International Journal of Future Generation Communication and Networking Vol.6, No.5 (2013), pp.97-116
[3]. Al-Sakib Khan Pathan, Hyung-Woo Lee, ChoongSeonHong“Security in Wireless Sensor Networks: Issues andChallenges”Feb. 20-
22, 2006 ICACT2006, ISBN 89-5519-129-4
[4]. Dr. G. Padmavathi,Mrs. D. Shanmugapriya ”A Survey of Attacks, Security Mechanisms andChallenges in Wireless Sensor
Networks “ IJCSIS Vol. 4, No. 1 & 2, 2009
[5]. Samira Kalantary, Sara Taghipour“A survey on architectures, protocols, applications, andmanagement in wireless sensor networks”
Journal of Advanced Computer Science & Technology, 3 (1) (2014) 1-11, doi: 10.14419/jacst.v3i1.1583
[6]. John Paul Walters, ZhengqiangLiang,Weisong Shi, and VipinChaudhary “Wireless Sensor Network Security: A Survey”Security in
Distributed, Grid, and Pervasive Computing 2006 Auerbach Publications, CRC Press
[7]. Yide Liu “Wireless Sensor Network Applications in Smart Grid:Recent Trends and Challenges” International Journal of Distributed
Sensor NetworksVolume 2012, Article ID 492819, 8 pagesdoi:10.1155/2012/492819
[8]. Ivan Stojmenovic “Handbook of Sensor Networks Algorithms and Architectures” A John Wiley & Sons, Inc., Publication
[9]. Dr. Manoj Kumar Jain “Wireless Sensor Networks: Security Issues andChallenges” 2011 IJCIT, ISSN 2078-5828 (PRINT), ISSN
2218-5224 (ONLINE), VOLUME 02, ISSUE 01, MANUSCRIPT CODE: 110746
[10]. Dr. Banta Singh Jangra, VijetaKumawat “A Survey on Security Mechanisms and Attacks in Wireless Sensor
Networks”International Journal of Engineering and Innovative Technology (IJEIT)Volume 2, Issue 3, September 2012ISSN: 2277-
3754ISO 9001:2008 Certified
[11]. HimanshuDiwan, PoojaAgrawal, A.K.Dwivedi “Current Status and Design Challenges inWireless Multimedia Sensor Networks”
International Journal of Engineering Trends and Technology (IJETT) – Volume 6 number 2- Dec 2013, ISSN: 2231-5381
[12]. Anil Kumar, Preetigulia , Shikha Sharma “A Study on Power Saving and Secure WSN”International Journal of Engineering Trends
and Technology (IJETT) – Volume 11 Number 4 - May 2014ISSN: 2231-5381
[13]. Abdalraouf Hassan and Christian Bach “Improving Security Connection in Wireless Sensor Networks”International Journal of
Innovation and Scientific ResearchISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 301-307
8. Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 41 | Page
[14]. B.Sangeetha “Wireless Sensor Networks: Issues, Challenges and Survey of Solutions” IJSRD - International Journal for Scientific
Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613
[15]. AnserGhazaal Ali Alquraishee, AasimZafar, Syed Hamid Hasan “Security Issues in Wireless Sensor Networks” MAGNT Research
Report (ISSN. 1444-8939) Vol.2(4):PP.82-91
[16]. S.Muthukarpagam, V.Niveditta, S.Neduncheliyan “Design issues, Topology issues, Quality of ServiceSupport for Wireless Sensor
Networks: Survey andResearch Challenges” 2010 International Journal of Computer Applications (0975 – 8887)Volume 1 – No. 6
[17]. Pratibha, Dr. Prem Chand Vashist “A Detail Survey on Wireless SensorNetworks (WSNs) Security Issues” IJCSMC, Vol. 3, Issue.
7, July 2014, pg.111 – 118 ISSN 2320–088X
[18]. HairongQia, S. SitharamaIyengarb, KrishnenduChakrabarty “Distributed sensor networks- a review ofrecent research”H. Qi et al. /
Journal of the Franklin Institute 338 (2001) 655–668
[19]. Chee-Yee Chong, and Srikanta P. Kumar “Sensor Networks: Evolution, Opportunities,and Challenges” Proceedings of the IEEE,
Vol. 91, No. 8, August 2003
[20]. ArchanaBharathidasan, Vijay AnandSaiPonduru “Sensor Networks: An Overview”
[21]. S SitharamaIyengar, R.L. Kashyap and Rabinder N Madan“Distributed Sensor Networks-Introduction to the Special Section” IEEE
Transactions on Systems, MAN and Cybernetics, Vol.21, No.5 September/ October 1991.
[22]. AashimaSingla, RatikaSachdeva “Review on Security Issues and Attacks in Wireless SensorNetworks” International Journal of
Advanced Research inComputer Science and Software Engineering, Volume 3, Issue 4, April 2013 ISSN: 2277 128X
[23]. AmrinderKaur , Sunil Saini“Simulation of Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Network”
International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013 ISSN:
2277 128X
[24]. Gowrishankar.S ,T.G.Basavaraju , Manjaiah D.H , Subir Kumar Sarkar “Issues in Wireless Sensor Networks”Proceedings of the
World Congress on Engineering 2008 Vol IWCE 2008, July 2 - 4, 2008, London, U.K.
[25]. BhaskarBhuyan, Hiren Kumar Deva Sarma, NityanandaSarma, AvijitKar, Rajib Mall“Quality of Service (QoS) Provisions in
Wireless SensorNetworks and Related Challenges” Wireless Sensor Network, 2010, 2, 861-868doi:10.4236/wsn.2010.211104
[26]. AlexandrosFragkiadakis, Vangelis Angelakis and Elias Z. Tragos“Securing Cognitive Wireless Sensor Networks: A Survey”
International Journal of Distributed Sensor NetworksVolume 2014, Article ID 393248, 12
pageshttp://dx.doi.org/10.1155/2014/393248
[27]. Vartika Shah, Sanjiv Sharma “A Review of Existing Security frameworks and Encryption Methods for Wireless Sensor Networks”
International Journal of Innovations & Advancement in Computer ScienceIJIACSISSN 2347 – 8616Volume 3, Issue 2April 2014
[28]. RajdeepBhanot, Naveen Bilandi “Security issues and challenges in wireless sensornetworks” I JRAS ET Vol. 2 Issue IV, April
2014ISSN: 2321-9653
[29]. JijeeshBaburajan, JigneshPrajapati “A Review Paper On Watchdog Mechanism In WirelessSensor Network To Eliminate False
Malicious Node Detection” IJRET: International Journal of Research in Engineering and Technology Volume: 03 Issue: 01 | Jan-
2014 EISSN: 2319-1163 | PISSN: 2321-7308
[30]. SaurabhUghade, R.K. Kapoor, AnkurPandey“An Overview on Wormhole Attack in Wireless Sensor Network: Challenges, Impacts,
and Detection Approach “International Journal of Recent Development in Engineering and TechnologyWebsite: www.ijrdet.com
(ISSN 2347 - 6435 (Online) Volume 2, Issue 4, April 2014)
[31]. JatinderSinghEr. AbhinavBhandari “A Review of Wireless Sensor Network Under the Denial Of Service Attack (DoS)”
a. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613
[32]. ShahriarMohammadi, Reza EbrahimiAtani, HosseinJadidoleslamy “A Comparison of Link Layer Attacks onWireless Sensor
Networks”Journal of Information Security, 2011, 2, 69-84doi:10.4236/jis.2011.22007
[33]. ParamjitKour, Lal Chand Panwar“A Review on Security Challenges and Attacks inWireless Sensor NetworksInternational Journal
of Science and Research (IJSR)ISSN (Online): 2319-7064
[34]. SachinLalar“Security in Wireless Sensor Networks: Issues and Security Mechanisms” International Journal of Current Engineering
and TechnologyE-ISSN 2277 – 4106, P-ISSN 2347 – 5161
[35]. JunaidAhsenaliChaudhry, Usman Tariq, Mohammed Arif Amin and Robert G. Rittenhouse “Sinkhole Vulnerabilities in Wireless
Sensor Networks” International Journal of Security and Its ApplicationsVol.8, No.1 (2014), pp.401-410
[36]. ZdravkoKarakehayov “Using REWARD to detect team black-hole attacks inwireless sensor networks”
[37]. KasımSinanYıldırım and ÖnderGürcan “Efficient Time Synchronization in a Wireless SensorNetwork by Adaptive Value
Tracking” IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014
[38]. UshamRobinchandra Singh, Sudipta Roy, HerojitMutum “A Survey on Wireless Sensor Network Security and its Countermeasures:
An Overview” International Journal of Engineering Science InventionISSN (Online): 2319 – 6734, ISSN (Print): 2319 –
6726www.ijesi.org Volume 2 Issue 9ǁ September. 2013 ǁ PP.19-37
[39]. J.SteffiAginoPriyanka, S.Tephillah and A.M.Balamurugan “Attacks And Countermeasures In WSN” IIJEC, Volume 2, Issue 1,
January 2014
[40]. WazirZadaKhana, Yang Xiangb, Mohammed Y Aalsalema, QuratulainArshada “The Selective Forwarding Attack in Sensor
Networks: Detections and Countermeasures” I.J. Wireless and Microwave Technologies, 2012, 2, 33-44, DOI:
10.5815/ijwmt.2012.02.06
[41]. PrakashgoudPatil,UmakantKulkarni “Delay Efficient Distributed Data Aggregation Algorithm in Wireless Sensor Networks”
International Journal of Computer Applications (0975 – 8887)Volume 69– No.1, May 2013
[42]. Kai Xing, ShyaamSundharRajamadamSrinivasan , Manny Rivera ,Jiang Li, Xiuzhen Cheng “Attacks and Countermeasures in
Sensor Networks: ASurvey”NETWORKSECURITYScott Huang, David MacCallum, and Ding Zhu Du(Eds.) 2005 Springer.
[43]. Ivanovitch Silva , LuizAffonsoGuedes , Paulo Portugal and Francisco Vasques “Reliability and Availability Evaluation ofWireless
SensorNetworks for Industrial Applications” Sensors 2012, 12, 806-838; doi:10.3390/s120100806
[44]. Luca Anchora , Antonio Capone , Vincenzo Mighali , Luigi Patrono , Francesco Simone “A novel MAC scheduler to minimize the
energy consumptionin a Wireless Sensor Network” Ad Hoc Networks 16 (2014) 88–104
[45]. M. EmreKeskin ,I. Kuban Altınel, Necati Aras , CemErsoy “Wireless sensor network lifetime maximization by optimalsensor
deployment, activity scheduling, data routing and sinkmobility” Ad Hoc Networks 17 (2014) 18–36
[46]. Hongxing Li , ChuanWua, Qiang-Sheng Hua , Francis C.M. Lau “Latency-minimizing data aggregation in wireless sensornetworks
under physical interference model” Ad Hoc Networks 12 (2014) 52–68
[47]. TifennRault , AbdelmadjidBouabdallah, YacineChallal “Energy efficiency in wireless sensor networks: A top-downsurvey”
Computer Networks 67 (2014) 104–122
[48]. HaidarSafa “A novel localization algorithm for large scale wireless sensor networks” Computer Communications 45 (2014) 32–46
[49]. B. P. S. Sahoo, Deepak Puthal “DRUG: An Energy-Efficient Data-Centric RoutingProtocol for Wireless Sensor Networks”
9. Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 42 | Page
arXiv:1404.4685v3 [cs.NI] 18 Jun 2014
[50]. Nitika Vats Doohan, SanjivTokekar “A Survey on Routing Techniques of Data-CentricWireless Sensor Networks”International
Journal of Computer Applications (0975 – 8887)Volume 53– No.16, September 2012
[51]. Prof. SachinDeshpande, Dr. J. W. Bakal, Prof. MritunjaykumarOjha “Simulation of Target Tracking in Wireless Sensor Network”
Volume 4, Issue 2, February 2014 IJARCSSE ISSN: 2277 128X .