This document proposes a new architecture called Software-Defined Wireless Sensor Networks (SD-WSN) that aims to address some key issues with traditional wireless sensor networks (WSNs). SD-WSN features a separation between a data plane of sensor nodes performing packet forwarding and a control plane of controllers that centralize network intelligence. The core component is called Sensor OpenFlow (SOF) which enables programmable flow-based forwarding on sensors via a standardized communication protocol with the control plane. This new approach could make WSNs more versatile, flexible to policy changes, and easier to manage. However, introducing SDN concepts to WSNs also presents new technical challenges for the SOF protocol and controlling overhead of control traffic in resource
Denial of Service (DoS) Attacks at Network Layer in WSNIJERA Editor
Recent advancements in technology, tiny size, cost effectiveness have made sensors as a crucial part of real
world sensitive applications. These sensor nodes are scattered over an area to monitor the situations like fire,
flood and record the data and to forward meaningful data to the center head node for observation, resulting an
advance prompt to control the situation. In last decade, WSN have grown significantly in variety of areas and
applications, resulted the high, consistent security mechanism. Also, there is variety of attacks on WSN at their
different layers of architecture. Though sensor nodes are not capable enough in terms of power, processing etc.
but applications based on these sensors demand on-time collection of information or data and then to send same
on reliable, secure delivery medium. Small sensors with limited hardware, processing cannot afford traditional
security mechanisms to face or sustain the attacks. There is variety of attacks at different layers of WSN
architecture to affect sensor‟s roles like signaling, framing, transmission etc. Many Denial of Service (DoS)
attacks are identified at each layer of WSN which are purposeful, planned attacks to hamper the availability of
service, restricting the sensor node‟s utility for problem solution. In this paper we will focus on the WSN
architecture, characteristics, constraints and various types of DoS attacks primarily on physical and data link
layer and particularly at network layer in details with some suggestions against attacks.
This volume of the Open Datacenter Interoperable Network (ODIN) describes software defined networking (SDN) and OpenFlow. SDN is used to simplify network control and management, automate network virtualization services, and provide a platform from which to build agile ....
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Denial of Service (DoS) Attacks at Network Layer in WSNIJERA Editor
Recent advancements in technology, tiny size, cost effectiveness have made sensors as a crucial part of real
world sensitive applications. These sensor nodes are scattered over an area to monitor the situations like fire,
flood and record the data and to forward meaningful data to the center head node for observation, resulting an
advance prompt to control the situation. In last decade, WSN have grown significantly in variety of areas and
applications, resulted the high, consistent security mechanism. Also, there is variety of attacks on WSN at their
different layers of architecture. Though sensor nodes are not capable enough in terms of power, processing etc.
but applications based on these sensors demand on-time collection of information or data and then to send same
on reliable, secure delivery medium. Small sensors with limited hardware, processing cannot afford traditional
security mechanisms to face or sustain the attacks. There is variety of attacks at different layers of WSN
architecture to affect sensor‟s roles like signaling, framing, transmission etc. Many Denial of Service (DoS)
attacks are identified at each layer of WSN which are purposeful, planned attacks to hamper the availability of
service, restricting the sensor node‟s utility for problem solution. In this paper we will focus on the WSN
architecture, characteristics, constraints and various types of DoS attacks primarily on physical and data link
layer and particularly at network layer in details with some suggestions against attacks.
This volume of the Open Datacenter Interoperable Network (ODIN) describes software defined networking (SDN) and OpenFlow. SDN is used to simplify network control and management, automate network virtualization services, and provide a platform from which to build agile ....
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
Introduction
Distributed Operating system
Evaluation of distributed computing system
Models
Gaining Popularity
Operating system
Issues in designing DOS
DCE
DCE component
Computer networks
Network types
Lan Technologies
tan technologies
wan technologies
WAN Switching Techniques
Communication Protocols
Protocols for DOS
Internetworking
Interconnection technique
Network management techniques
ATM technologies
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
Multimedia communication over wireless Ad-hoc networks has become the driving technology for many of the important applications, experiencing dramatic market growth and promising revolutionary experiences in personal communication, gaming, entertainment, military, security, environment monitoring, and more. The advances in wireless communications and growth of real-time applications have necessitated the development of wireless networks that can support high Quality of Service (QoS) and power control. A node in an ad hoc network is normally battery operated which poses a huge constraint on the power consumption of such a node. Hence, designing a power efficient MAC protocol for ad hoc wireless networks is a major challenge. In this paper, we propose a CDMA based power controlled medium access protocol for mobile and ad hoc network (MNA). The protocol conserves power and provides QoS guarantees for multimedia traffics. In that network one of the fundamental challenger in MANETs is how to increase the overall network throughputs well as reading the delay while maintaining how energy consumption for packet processing in communication. simulation results shows that the performance of the protocol with increase in traffic while QoS is better in terms of Energy consumption, throughput, & communication delay than existing protocol.
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
MANET is a collection of wireless independent nodes along with transmitter and receiver that communicate with each other via bidirectional link. The self-configuring ability of nodes in MANET made it popular among critical mission applic ations like military use or emergency recovery. But due to the changing topology and open access MANET become vulnerable to problems (such as receiver collision,limited trans mission power,false misbehaviour report,packet dropping) To solve this problem we use three approaches of Intrusion Detection System (IDS) such as Watchdog,TWOACK,and AACK. We have proposed a new protocol design for MANET that is IDS based EAACK which cons ist of ACK,S-ACK and MRA for solving all the problems of Watchdog approach in ID S of MANET.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Centralized System in MANET with GRP Protocolijceronline
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes.. In this paper routing protocols GRP for mobile ad hoc network with centralized system is checked to know the performance of the network. We will see that, is their any change in the performance of the network if will deploy centralized system in MANET.
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
ABSTRACT - Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of
applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self –
configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh
connectivity. Because of their fast connectivity wireless mesh networks (WMNs) is widely used in military applications.
Security is the major constrain in wireless mesh networks (WMNs). This paper considers a special type of DoS attack
called selective forwarding attack or greyhole attack. With such an attack, a misbehaving mesh router just forwards few
packets it receives but drops sensitive data packets. To mitigate the effect of such attack an approach called FADE :
Forward Assessment based Detection is adopted. FADE scheme detects the presence of attack inside the network by
means of two-hop acknowledgment based monitoring and forward assessment based detection. FADE operates in three
phases and analyzed by determining optimal threshold values. This approach is found to provide effective defense against
the collaborative internal attackers in WMNs.
Advancements in Complementary Metal Oxide Semiconductor (CMOS) technology have enabled Wireless Sensor Networks (WSN) to gather, process and transport multimedia (MM) data as well and not just limited to handling ordinary scalar data anymore. This new generation of WSN type is called Wireless Multimedia Sensor Networks (WMSNs). Better and yet relatively cheaper sensors – sensors that are able to sense both scalar data and multimedia data with more advanced functionalities such as being able to handle rather intense computations easily - have sprung up. In this paper, the applications, architectures, challenges and issues faced in the design of WMSNs are explored. Security and privacy issues, over all requirements, proposed and implemented solutions so far, some of the successful achievements and other related works in the field are also highlighted. Open research areas are pointed out and a few solution suggestions to the still persistent problems are made, which, to the best of my knowledge, so far haven’t been explored yet.
Introduction to SDN: Software Defined NetworkingAnkita Mahajan
SDN is the next big thing in networking. It focuses on separating the intelligence from the hardware. OpenFlow is one of the ways (currently the open standard followed by all Datacenters) to implement SDN.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
Introduction
Distributed Operating system
Evaluation of distributed computing system
Models
Gaining Popularity
Operating system
Issues in designing DOS
DCE
DCE component
Computer networks
Network types
Lan Technologies
tan technologies
wan technologies
WAN Switching Techniques
Communication Protocols
Protocols for DOS
Internetworking
Interconnection technique
Network management techniques
ATM technologies
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
Multimedia communication over wireless Ad-hoc networks has become the driving technology for many of the important applications, experiencing dramatic market growth and promising revolutionary experiences in personal communication, gaming, entertainment, military, security, environment monitoring, and more. The advances in wireless communications and growth of real-time applications have necessitated the development of wireless networks that can support high Quality of Service (QoS) and power control. A node in an ad hoc network is normally battery operated which poses a huge constraint on the power consumption of such a node. Hence, designing a power efficient MAC protocol for ad hoc wireless networks is a major challenge. In this paper, we propose a CDMA based power controlled medium access protocol for mobile and ad hoc network (MNA). The protocol conserves power and provides QoS guarantees for multimedia traffics. In that network one of the fundamental challenger in MANETs is how to increase the overall network throughputs well as reading the delay while maintaining how energy consumption for packet processing in communication. simulation results shows that the performance of the protocol with increase in traffic while QoS is better in terms of Energy consumption, throughput, & communication delay than existing protocol.
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
MANET is a collection of wireless independent nodes along with transmitter and receiver that communicate with each other via bidirectional link. The self-configuring ability of nodes in MANET made it popular among critical mission applic ations like military use or emergency recovery. But due to the changing topology and open access MANET become vulnerable to problems (such as receiver collision,limited trans mission power,false misbehaviour report,packet dropping) To solve this problem we use three approaches of Intrusion Detection System (IDS) such as Watchdog,TWOACK,and AACK. We have proposed a new protocol design for MANET that is IDS based EAACK which cons ist of ACK,S-ACK and MRA for solving all the problems of Watchdog approach in ID S of MANET.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Centralized System in MANET with GRP Protocolijceronline
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes.. In this paper routing protocols GRP for mobile ad hoc network with centralized system is checked to know the performance of the network. We will see that, is their any change in the performance of the network if will deploy centralized system in MANET.
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
ABSTRACT - Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of
applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self –
configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh
connectivity. Because of their fast connectivity wireless mesh networks (WMNs) is widely used in military applications.
Security is the major constrain in wireless mesh networks (WMNs). This paper considers a special type of DoS attack
called selective forwarding attack or greyhole attack. With such an attack, a misbehaving mesh router just forwards few
packets it receives but drops sensitive data packets. To mitigate the effect of such attack an approach called FADE :
Forward Assessment based Detection is adopted. FADE scheme detects the presence of attack inside the network by
means of two-hop acknowledgment based monitoring and forward assessment based detection. FADE operates in three
phases and analyzed by determining optimal threshold values. This approach is found to provide effective defense against
the collaborative internal attackers in WMNs.
Advancements in Complementary Metal Oxide Semiconductor (CMOS) technology have enabled Wireless Sensor Networks (WSN) to gather, process and transport multimedia (MM) data as well and not just limited to handling ordinary scalar data anymore. This new generation of WSN type is called Wireless Multimedia Sensor Networks (WMSNs). Better and yet relatively cheaper sensors – sensors that are able to sense both scalar data and multimedia data with more advanced functionalities such as being able to handle rather intense computations easily - have sprung up. In this paper, the applications, architectures, challenges and issues faced in the design of WMSNs are explored. Security and privacy issues, over all requirements, proposed and implemented solutions so far, some of the successful achievements and other related works in the field are also highlighted. Open research areas are pointed out and a few solution suggestions to the still persistent problems are made, which, to the best of my knowledge, so far haven’t been explored yet.
Introduction to SDN: Software Defined NetworkingAnkita Mahajan
SDN is the next big thing in networking. It focuses on separating the intelligence from the hardware. OpenFlow is one of the ways (currently the open standard followed by all Datacenters) to implement SDN.
Survey of optimizing dynamic virtual local area network algorithm for softwar...TELKOMNIKA JOURNAL
Software-defined network (SDN) is one of the most predominant technologies for networking in the existing and next-generation networks. Therefore, this paper is conducted to introduce a survey for researchers who are interested in exploiting the dynamic tunneling technique to optimize software-defined wide area network (SD-WAN). The main purpose of this survey is not only to investigate the related works of dynamic tunneling with SD-WAN but also to classify this related work according to the aim of each research into the practicable categories and present the most dominated employments for tunneling with SD-WAN, specifically virtual local area network (VLAN). The performed classification accompany dynamic tunneling in SDN can be summarized into four categories as following: exploring VLAN in SDN; management of multi VLAN in SDN; recover link failure of SDN; and development of SDN by using VLAN. Finally,
the intensive study of the literature in this paper discovers that the dominant path of research falls in the class that covers SDN’s link failure. This class takes full advantage of SD-WANs due to offering more robust networking and restoring most communication failures. In the event of a fault, the controller could respond and recover quickly by switching to a pre-computed backup route.
SDN and it’s Application in Wireless Mesh NetworkMilap Bhanderi
This is a review report (and also a kind of survey paper) which comprises some research papers having concepts of SDN like SDWMN, wmSDN, NEON technology, D-SDWMN which gives insights of SDN architecture and related studies. This paper was submitted by myself in the year 2019 at Dalhousie University, Halifax, NS during the SDN course.
A modified clustered based routing protocol to secure wireless sensor network...eSAT Journals
Abstract Wireless Sensor Network (WSN) comprises of sensor nodes, which form a network by building connections wirelessly, to send detected information from source to destination. Routing Protocols are utilized to shape honest to goodness and littlest routes between a starting node (source) and ending node (destination). Numerous WSN applications use various hierarchical routing protocols. Low Energy Adaptive grouping (LEACH) is the first hierarchical routing protocols and it takes after the standard of forming cluster of nodes and picking a cluster head randomly among the nodes for inter cluster communication. This type of cluster head election leads to attack by adversary node, hence a Modified LEACH algorithm is proposed in this paper. The execution of LEACH and Modified LEACH is assessed utilizing distinctive performance measurements and Modified LEACH was discovered to be extremely compelling in enhancing overall performance of the WSN. MATLAB is made use of, to simulate the undertaking situation. Keywords: WSN, LEACH, Hierarchical protocols, Cluster Head.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
Wireless Sensor Networks (WSNs) are used in many application fields, such as military,
healthcare, environment surveillance, etc. The WSN OS based on event-driven model doesn’t
support real-time and multi-task application types and the OSs based on thread-driven model
consume much energy because of frequent context switch. Due to the high-dense and largescale
deployment of sensor nodes, it is very difficult to collect sensor nodes to update their
software. Furthermore, the sensor nodes are vulnerable to security attacks because of the
characteristics of broadcast communication and unattended application. This paper presents a
task and resource self-adaptive embedded real-time microkernel, which proposes hybrid
programming model and offers a two-level scheduling strategy to support real-time multi-task
correspondingly. A communication scheme, which takes the “tuple” space and “IN/OUT”
primitives from “LINDA”, is proposed to support some collaborative and distributed tasks. In
addition, this kernel implements a run-time over-the-air updating mechanism and provides a
security policy to avoid the attacks and ensure the reliable operation of nodes. The performance
evaluation is proposed and the experiential results show this kernel is task-oriented and
resource-aware and can be used for the applications of event-driven and real-time multi-task.
TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...cscpconf
Wireless Sensor Networks (WSNs) are used in many application fields, such as military,
healthcare, environment surveillance, etc. The WSN OS based on event-driven model doesn’t
support real-time and multi-task application types and the OSs based on thread-driven model
consume much energy because of frequent context switch. Due to the high-dense and largescale
deployment of sensor nodes, it is very difficult to collect sensor nodes to update their
software. Furthermore, the sensor nodes are vulnerable to security attacks because of the
characteristics of broadcast communication and unattended application. This paper presents a
task and resource self-adaptive embedded real-time microkernel, which proposes hybrid
programming model and offers a two-level scheduling strategy to support real-time multi-task
correspondingly. A communication scheme, which takes the “tuple” space and “IN/OUT”
primitives from “LINDA”, is proposed to support some collaborative and distributed tasks. In
addition, this kernel implements a run-time over-the-air updating mechanism and provides a
security policy to avoid the attacks and ensure the reliable operation of nodes. The performance
evaluation is proposed and the experiential results show this kernel is task-oriented and
resource-aware and can be used for the applications of event-driven and real-time multi-task.
Controller Placement Problem resiliency evaluation in SDN-based architecturesIJCNCJournal
The Software-Defined Networking (SDN) paradigm does represent an effective approach aimed at enhancing the performance of core networks by introducing a clean separation between the routing plane and the forwarding plane. However, the centralized architecture of SDN networks raises resiliency concerns that are addressed by a class of algorithms falling under the Controller Placement Problem (CPP) umbrella term. Such algorithms seek the optimal placement of the SDN controller. In this paper, we evaluate the main CPP algorithms and provide an experimental analysis of their performance, as well as of their capability to dynamically adapt to network malfunctions and disconnections.
Controller Placement Problem Resiliency Evaluation in SDN-based ArchitecturesIJCNCJournal
The Software-Defined Networking (SDN) paradigm does represent an effective approach aimed at enhancing the performance of core networks by introducing a clean separation between the routing plane and the forwarding plane. However, the centralized architecture of SDN networks raises resiliency concerns that are addressed by a class of algorithms falling under the Controller Placement Problem (CPP) umbrella term. Such algorithms seek the optimal placement of the SDN controller. In this paper, we evaluate the main CPP algorithms and provide an experimental analysis of their performance, as well as of their capability to dynamically adapt to network malfunctions and disconnections.
SDN Performance evaluation for floodlight controller and OVS controller using adaptive approaches (i.e. statistical approach and genetic algorithm approach).
1. 1896 IEEE COMMUNICATIONS LETTERS, VOL. 16, NO. 11, NOVEMBER 2012
Sensor OpenFlow: Enabling Software-Defined Wireless Sensor Networks
Tie Luo, Hwee-Pink Tan, and Tony Q. S. Quek
Abstract—While it has been a belief for over a decade that
wireless sensor networks (WSN) are application-specific, we
argue that it can lead to resource underutilization and counter-
productivity. We also identify two other main problems with
WSN: rigidity to policy changes and difficulty to manage. In
this paper, we take a radical, yet backward and peer compat-
ible, approach to tackle these problems inherent to WSN. We
propose a Software-Defined WSN architecture and address key
technical challenges for its core component, Sensor OpenFlow.
This work represents the first effort that synergizes software-
defined networking and WSN.
Index Terms—Software-defined networking, OpenFlow, wire-
less sensor networks.
I. M OTIVATION Fig. 1. Software-defined wireless sensor networks.
E VER since their debut over a decade ago, wireless
sensor networks (WSN1 ) have been conceived to be
application-specific [1], which has probably formed a belief “phase-II” in project planning, and hence entails “hacking”
thus far. However, we deem it worth an afterthought, with the existing code on sensor nodes, which is a big headache to
upsurge of sensor applications nowadays and the advancement developers and is highly error-prone.
of sensor technologies such as multi-modal and high-end The above problems are not superficial symptoms but are
mote platforms (e.g., Imote2, Stargate and NetBridge). These inherent to WSN and deep-rooted in the architecture: each
new changes render application-specific WSN prone to (1) node is fully fledged with all physical up to application
resource underutilization, where multiple WSN for respective layer functionalities, collectively behaving like an autonomous
applications are deployed in the same or overlapping terrain system that performs various networking functions such as data
while a single “versatile” WSN could achieve the same ob- forwarding and network control. Although this architecture
jectives, and (2) counter-productivity, where different vendors works well most of the time due to many well-designed
develop WSN in isolation without adequately reusing common algorithms, it lacks good abstraction and carries too much
functionalities which would considerably expedite prototyping complexity, making WSN unwieldy, inelastic to change and
and production. hard to manage.
Another problem with WSN is that they are rigid to policy
changes. Policies are rules related to network-exogenous fac- II. SD-WSN AND S ENSOR O PEN F LOW
tors such as business operation and user access, as opposed to
network-endogenous factors such as node and link properties In this paper, we take the first move to tackle the above-
which have been extensively studied over the years and han- mentioned problems, using a radical, yet backward and peer
dled algorithmically. Policy changes, engendered by the ever- compatible, approach. We propose Software-Defined WSN
changing business needs, are hard to cope with by algorithms (SD-WSN), an architecture featuring a clear separation be-
and often dictate manual reconfiguration or reprogramming of tween a data and a control plane, and Sensor OpenFlow (SOF),
WSN, which is difficult because of vendors’ complicated and the core component of SD-WSN as a standard communication
often proprietary implementations. As a result, it is usually protocol between the two planes. The data plane consists
inevitable to involve vendors and hence incur delay in policy of sensors performing flow-based packet forwarding, and the
enforcement, and considerable financial and opportunity cost. control plane consists of one (or possibly more) controller that
A third problem is that WSN are hard to manage. This centralizes all the network intelligence, performing network
is because developing a network management system (NMS) control such as routing and QoS control. This architecture is
for distributed WSN is a demanding task in the first place. depicted in Fig. 1. The whole idea is to make the underlying
Furthermore, in practice, this task is often scheduled as network (i.e., data plane) programmable by manipulating a
user-customizable flow table on each sensor via SOF.
Manuscript received July 31, 2012. The associate editor coordinating the Our proposal is underpinned by the recently emerged
review of this letter and approving it for publication was D. Qiao. software-defined networking (SDN) paradigm [2] and Open-
The authors are with the Institute for Infocomm Research, A*STAR,
Singapore. T. Q. S. Quek is also with Singapore University of Technol- Flow [3], proposed for enterprise and carrier networks. They
ogy and Design, Singapore (e-mail: {luot, hptan, qsquek}@i2r.a-star.edu.sg, have become a resounding success, gaining wide support from
tonyquek@sutd.edu.sg). a large number of industries including Microsoft, Google,
Digital Object Identifier 10.1109/LCOMM.2012.092812.121712
1 Throughout this paper, we use “WSN” regardless of its singular or plural Facebook, HP, Deutsche Telekom, Verizon, Cisco, IBM, and
form to avoid readers’ inconvenience in pronouncing “WSNs”. Samsung.
1089-7798/12$31.00 c 2012 IEEE
2. LUO et al.: SENSOR OPENFLOW: ENABLING SOFTWARE-DEFINED WIRELESS SENSOR NETWORKS 1897
In the academia, related research has recently heated up on temperature>30◦C”. SOF must cope with this in the first place
a variety of topics [4]–[7]. These studies were all conducted for flow creation.
in the context of enterprise and carrier networks alike, such
as data centers, where SDN/OpenFlow originated from. In
stark contrast, WSN represent a sheerly distinct environment B. Control Plane: SOF Channel
and thereby confront concepts like SD-WSN and SOF with
significant challenges. An OpenFlow channel is an end-to-end connection used to
However, we deem it worth exploring to introduce the transmit control messages between a controller and a switch.
fundamental idea of SDN into WSN and tailor it into a An SOF channel is similarly defined. However, this channel
viable approach to solve WSN-inherent problems. Indeed, we must provide TCP/IP connectivity [8] for reliable end-to-
envisage SD-WSN to transform traditional WSN into networks end in-order message delivery, and the two end-parties are
that are: identified using IP addresses. These are generally unavailable
• Versatile: supporting multiple applications in a plug-and- in WSN and need to be addressed.
play manner; sensors are no longer application-dependent
but application-customizable. This is achieved by (i) the
programmable data plane which supports virtually all sorts C. Overhead of Control Traffic
of packet forwarding rules, and (ii) the control plane which
SDN can (and usually would) host the OpenFlow channel
decouples upper applications from physical devices (i.e., sen-
out of band, i.e., using a separate dedicated network. This is
sors) and provides a global, unified view of the underlying
normally not practical for WSN and the SOF channel has to
network to the applications.
be hosted in band, i.e., by the WSN itself. Thus, the resource-
• Flexible: easy to enforce policy changes throughout the
constrained WSN will have to additionally carry control traffic
entire network, which used to be a tedious task and is prone
between controllers and sensors. This is further exacerbated
to inconsistency. This is achieved by the centralized and
by the fact that control traffic in WSN tends to be large due to
extremely granular network control in SD-WSN, where the
the high network dynamics (node/link failures, energy-aware
granularity is supplied by the fully user-customizable flow
routing, mobility, etc.). Hence, without a proper mechanism
tables.
to curb control traffic overhead, the underlying WSN can be
• Easy to manage: building an NMS is no different from
overloaded.
adding another application on top of the control plane, using
open APIs and without hassle of hacking existing code. In
addition, the centralized network view provided by the control
plane is a great facility, as network administrators prefer D. Traffic Generation
centralized NMS in practice. End-users are considered peripheral to SDN and hence out
of the scope of OpenFlow. On the contrary, sensor nodes
III. T ECHNICAL C HALLENGES behave like end-users by generating data packets, in addition
The fundamental assumption that OpenFlow makes is that to merely forwarding data as OpenFlow switches do.
the underlying network is composed of high-speed switches
such as Ethernet/MPLS switches and IP routers. OpenFlow
was also designed as a wired protocol, and its typical use cases E. In-Network Processing
are data centers, cellular backhaul, enterprise WiFi backbone,
and WANs. Compared to WSN, these represent significant At times, WSN need to process data in-situ, e.g., perform
disparities and lead to major challenges in designing SOF. data aggregation or decision fusion, in order to reduce data
redundancy and conserve network resource such as bandwidth
and energy. This is another feature absent in SDN.
A. Data Plane: Creating Flows
At the data plane, packets are handled as per flows. A flow
is a programmable (i.e., user-customizable) set of packets that
F. Backward and Peer Compatibility
share certain properties specified by a Match in a flow-table
entry, or flow entry for short. The Match is often wildcarded, Albeit radical, SOF should desirably provide backward
like “IP source address is 10.0.*.*”, and packets that match it compatibility, with respect to traditional (non-OpenFlow and
will be treated as in the same flow and be imposed an Action non-SOF) networks, so as to protect legacy investments.
(e.g., “send to port 1”) specified by the same flow entry (cf. It is also desirable for SOF to offer peer compatibility, i.e.,
Fig. 1 or 2). to be compatible with OpenFlow networks which are concur-
OpenFlow implicitly assumes the presence of IP-like ad- rently being developed and standardized, for interoperability
dressing so as to create flows. For example, it defines Match purposes.
fields such as IPv4_SRC, ETH_DST and MPLS_LABEL to
match packets with IPv4 source address, Ethernet destination
address and MPLS label, respectively. However, as opposed IV. P ROPOSED S OLUTIONS
to address-centric OpenFlow networks, WSN are typically
data-centric—acquiring data of interest is more important than In this section, we provide a suite of preliminary solutions
knowing who sent the data—and employ different addressing to the issues identified above, based on the latest OpenFlow
such as attribute-based naming, e.g., “nodes whose sensing specification (v1.3.0) [8].
3. 1898 IEEE COMMUNICATIONS LETTERS, VOL. 16, NO. 11, NOVEMBER 2012
Fig. 4. The (new) CAV format with one AV pair; multiple AV pairs shall
be concatenated.
Fig. 2. A flow entry with Match defined in the OXM format.
Fig. 3. Creating Class-1 flows by defining Match using OXM.
Fig. 5. Creating Class-2 flows by defining Match using CAV.
A. Data Plane: Creating Flows
We give two solutions for flow creation, from which a
network operator can choose based on his own preference. The operator chooses the non-IP solution, i.e., redefining flow
first solution is to redefine flow tables to cater for the special tables, then the SOF channel can be supplied by overlaying
addressing schemes in WSN. We classify WSN addressing a transport protocol directly over WSN. Designing such a
schemes into Class-1, compact network-unique addresses such protocol has been well studied in the past decade and hence,
as the ZigBee 16-bit network addresses (e.g., 0x796F as as- not to reinvent the wheel, we compile and make publicly
signed by the CSkip algorithm [9]), and Class-2, concatenated accessible a comprehensive list of credible works on WSN
attribute-value pairs (CAV) such as “30<temperature<60” transport protocol design, implementation, experimentation
and “Zone-ID=7 AND x-coordinate>150”. and verification [13].
We handle Class-1 by exploiting the OpenFlow extensible If, otherwise, the network operator chooses to augment
match (OXM), a type-length-value (TLV) format used to WSN with IP (and use our recommended IP stacks), SOF
define flow Matches, as explained by Fig. 2. In SOF, we channels will be self-supplied because uIP, uIPv6 and Blip
introduce two new oxm_type’s to represent Class-1 addresses: are all shipped with ready-to-use TCP implementations.
OXM_SOF_SRC (source) and OXM_SOF_DST (destination), and
construct Class-1 flow Matches under the same OXM frame-
work. A self-explanatory example is given in Fig. 3, where the C. Curbing Control Traffic
flow will be composed of packets with source network address As aforementioned, the control traffic carried by the in-
of 0x7900–0x79FF and destination address of 0 (ZigBee band SOF channel may overload the underlying WSN. Our
coordinator). solution is based on the following observations. First, the
We handle Class-2 by introducing our CAV format, which control traffic is mainly comprised of two types of control
is a quadruple defined by Fig. 4. Then, by adding a new messages: (1) packet-in and (2) packet-out or flow-mod.
oxm_type, OXM_SOF_CAV, we are able to form any Class-2 A packet-in is a flow setup request, sent by a sensor to a
flows, as illustrated by Fig. 5, where temperature is assumed controller to seek instruction on how to handle an incoming
to be an int32 stored at offset 48 of each packet, Zone-ID packet upon table-miss (a packet does not match any flow
(int16) at offset 40, and x-coordinate (int16) at offset 42. entry). A packet-out or flow-mod is the response from the
The second solution is to augment WSN with IP, for which controller giving instruction to the requesting sensor.
we capitalize on and recommend two off-the-shelf IP stacks: Second, the control traffic resulting from this can be sig-
• uIP and uIPv6: uIP is an IPv4 implementation on Contiki nificant, because WSN traffic is often bursty—an event of
OS [10], an open source operating system for WSN and interest can trigger a large swarm of packets from several
the Internet of things. uIPv6 is a fully compliant IPv6 sensors, leading to many flow setup requests simultaneously.
extension to uIP and is “IPv6 Ready Phase 1 certified” This scenario repetitively appears because each flow entry is
(has the right to use the IPv6 Ready silver logo). Both associated with an expiring timer.
uIP and uIPv6 are now part of Contiki OS, contributed In our solution, a sensor only sends one packet-in for
by Cisco, Redwire, SAP and SICS. the first table-miss and suppresses subsequent packet-in
• Blip: the Berkeley IP implementation for low-power net- whose associated packets have the same destination address
works [11], which is an open source IPv6 implementation (Class-1 or Class-2) as the first packet, until the corresponding
for TinyOS based on the 6LoWPAN standard [12]. It has packet-out or flow-mod is received or a predefined timeout
been extensively verified on MicaZ, TelosB, and Epic occurs. The rationale is twofold. Firstly, because the end-to-
platforms. end SOF channel is slow (as it is in-band of WSN), the latency
between sending packet-in and receiving packet-out or
flow-mod is much larger than in OpenFlow. Therefore, there
B. Control Plane: SOF Channel can be a large number of incoming packets during this interval.
The design of control plane must be consistent with the data Secondly, since the major traffic in WSN is upstream (from
plane. Therefore, corresponding to the two solutions above, we many sensors to one or a few sinks), it is effective to use
also provide two solutions for the SOF channel. If the network destination addresses to bundle packets into flows.
4. LUO et al.: SENSOR OPENFLOW: ENABLING SOFTWARE-DEFINED WIRELESS SENSOR NETWORKS 1899
similarly as by OpenFlow, which directs packets to traditional
(a) Prerequisite of OpenFlow: a TLV of IPv4 must be preceded by a TLV sensor network forwarding.
of ETH_TYPE=0x0800.
The novelty lies in handling peer compatibility. To be
compatible with OpenFlow, SOF should enable OpenFlow
to recognize SOF flow tables so that OpenFlow can rele-
gate Class-1 and Class-2 flow entries to SOF. We exploit
(b) OpenFlow-compatible SOF flow entries: a Class-1 entry (upper) and a prerequisite structure of OpenFlow, which specifies that a
a Class-2 entry (lower). protocol-specific OXM TLV, e.g., IPv4, must be preceded by
Fig. 6. Making SOF peer compatible with OpenFlow. a particular value of ETH_TYPE for differentiation purposes.
For example, an IPv4 TLV must be preceded by a ETH_TYPE
of 0x0800 (Fig. 6a), and similarly, IPv6 by 0x86dd and ARP
In fact, this method can also be applied to (general) by 0x0806.
OpenFlow networks. We have developed such an algorithm For the newly introduced Class-1 and Class-2 flows, we
called Control-Message Quenching (CMQ) [14] for OpenFlow designate two unused values of ETH_TYPE, 0x0802 and
networks and verified its effectiveness in reducing flow setup 0x0808, respectively. Thus, an SOF flow entry (oxm_type
latency and elevating network throughput. = OXM_SOF_SRC/DST or OXM_SOF_CAV) can be defined as
exemplified by Fig. 6b, which achieves peer compatibility.
D. Traffic Generation
We add a traf-gen module on each sensor as shown in
Fig. 1. It is a simple module that can be implemented as an V. C ONCLUSION
interrupt routine, because sensory data generation consists of This paper presents the first effort that synergizes SDN
two very simple steps: reading data from the sensing hardware, and WSN to solve WSN-inherent problems. The proposed
and converting the data if needed. An example is given below, solution, SD-WSN with SOF, might provoke interesting dis-
based on the Arduino sensor platform [15]: cussions from the research community and open the door to a
int raw = analogRead(pin); // read raw data from h/w pin wide range of innovation opportunities. By that and ultimately,
// next, convert to user-friendly data:
// 1) in the case of ultrasound sensors, raw is the measured distance in cm:
we expect to see a new generation of WSN that are versatile,
float distanceInMeter = raw / 100; flexible, and easy to manage.
// 2) in the case of temperature sensors, raw is degree Celsius scaled by 20:
float temperatureInCelsius = raw / 20;
// 3) in the case of potentiometers, raw is voltage scaled from 5(V) to 1023:
float voltage = raw * 5.0 / 1023.0; R EFERENCES
Depending on implementation, this traf-gen module can [1] W. Heinzelman, “Application-specific protocol architectures for wireless
run in a blocking (synchronously awaiting sensory data to networks,” Ph.D. dissertation, MIT, 2000.
[2] Open Networking Foundation, “Software-defined networking: the new
become available), callback (asynchronously triggered by a norm for networks,” white paper, Apr. 2012.
“data-available” event), or round-robin (periodically checking [3] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson,
if data are available) manner. J. Rexford, S. Shenker, and J. Turner, “OpenFlow: enabling innovation
in campus networks,” SIGCOMM Comput. Commun. Rev., vol. 38, no. 2,
pp. 69–74, 2008.
E. In-Network Processing [4] A. R. Curtis, W. Kim, and P. Yalagandula, “Mahout: low-overhead
datacenter traffic management using end-host-based elephant detection,”
An in-net proc module is added as shown in Fig. 1. If in 2011 IEEE INFOCOM.
the processing is not needed by a packet, this module simply [5] M. Yu, J. Rexford, M. J. Freedman, and J. Wang, “Scalable flow-based
passes the packet intact to the flow table. In case of possible networking with DIFANE,” in 2010 ACM SIGCOMM.
[6] P. Dely, A. Kassler, and N. Bayer, “OpenFlow for wireless mesh
future changes to the processing algorithm, we use over-the- networks,” in 2011 IEEE WiMAN.
air programming (OTA), a commercially available technology [7] K. Jeong, J. Kim, and Y.-T. Kim, “QoS-aware network operating system
that allows updating sensor firmware and software wirelessly for software defined networking with generalized OpenFlows,” in 2012
IEEE/IFIP NOMS.
and remotely. Libelium [16], for instance, offers a package [8] Open Networking Foundation, “OpenFlow switch specification,” Apr.
that features secured and interference-free OTA programming 16, 2012, version 1.3.0. Available: https://www.opennetworking.org/
over a large network in seconds or up to a few minutes. images/stories/downloads/specification/openflow-spec-v1.3.0.pdf
We note that in-network processing makes the design not [9] A. Elahi and A. Gschwender, ZigBee Wireless Sensor and Control
Network. Prentice Hall, 2009, chapter 9.
purely “clean-slate”, which we deem as a compromise that [10] The Contiki OS, http://www.contiki-os.org.
WSN has to make due to its unique characteristics. In fact, data [11] Blip: Berkeley IP, http://smote.cs.berkeley.edu:8000/tracenv/wiki/blip.
aggregation is the most common in-network processing and [12] G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, “IETF RFC4944
(6LoWPAN): Transmission of IPv6 packets over IEEE 802.15.4 net-
can usually be accomplished using standard operations such works,” 2007. Available: http://www.ietf.org/rfc/rfc4944.txt
as average, median, min, max, or removing redundant data. [13] T. Luo, H.-P. Tan, and T. Q. S. Quek, “A compiled list of transport
Therefore, it could be absorbed into flow tables as a special protocols for wireless sensor networks,” May 2012. Available: http://
way of packet handling, which would mitigate the compromise www1.i2r.a-star.edu.sg/∼ luot/wsn-tp.pdf
[14] T. Luo, H.-P. Tan, P. C. Quan, Y. W. Law, and J. Jin, “Enhancing re-
and enhance network programmability. We leave this as an sponsiveness and scalability for OpenFlow networks via control-message
open question to the research community. quenching,” in 2012 International Conference on ICT Convergence.
[15] Arduino platform, http://www.arduino.cc.
F. Backward and Peer Compatibility [16] D. Gascon, A. Bielsa, F. Genicio, and M. Yarza, “Over the air program-
SOF inherits backward compatibility from OpenFlow. An ming with 802.15.4 and zigbee - OTA,” May 9, 2011. Available: http://
www.libelium.com/over the air programming OTA 802.15.4 ZigBee/
SOF-hybrid sensor will have a NORMAL logical port defined