Results 1 - 10
of
35
Computational Intelligence in Wireless Sensor Networks: A Survey
- IEEE COMMUNICATIONS SURVEYS & TUTORIALS
, 2011
"... Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many challenges, mainly caused by communication failures, storage and computational constraints and limited power supply. Paradigms o ..."
Abstract
-
Cited by 41 (0 self)
- Add to MetaCart
Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many challenges, mainly caused by communication failures, storage and computational constraints and limited power supply. Paradigms of computational intelligence (CI) have been successfully used in recent years to address various challenges such as data aggregation and fusion, energy aware routing, task scheduling, security, optimal deployment and localization. CI provides adaptive mechanisms that exhibit intelligent behavior in complex and dynamic environments like WSNs. CI brings about flexibility, autonomous behavior, and robustness against topology changes, communication failures and scenario changes. However, WSN developers are usually not or not completely aware of the potential CI algorithms offer. On the other side, CI researchers are not familiar with all real problems and subtle requirements of WSNs. This mismatch makes collaboration and development difficult. This paper intends to close this gap and foster collaboration by offering a detailed introduction to WSNs and their properties. An extensive survey of CI applications to various problems in WSNs from various research areas and publication venues is presented in the paper. Besides, a discussion on advantages and disadvantages of CI algorithms over traditional WSN solutions is offered. In addition, a general evaluation of CI algorithms is presented, which will serve as a guide for using CI algorithms for WSNs.
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
- International Journal of Network Security
, 2007
"... In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor network, where some of these nodes act maliciously. We propose a protocol based on game theory which achieves the design obj ..."
Abstract
-
Cited by 18 (0 self)
- Add to MetaCart
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor network, where some of these nodes act maliciously. We propose a protocol based on game theory which achieves the design objectives of truthfulness by recognizing the presence of nodes that agree to forward packets but fail to do so. This approach categorizes different nodes based upon their dynamically measured behavior. Through simulation we evaluate proposed protocol using packet throughput and the accuracy of misbehaving node detection.
Topology Control for Secured Coverage in Wireless Sensor Networks
, 2007
"... In this paper, we present a new control method that makes some node adjustments in local areas in an effort to cover the “holes” in wireless sensor networks. Many security applications often face the problem of holes when some sensor nodes are disabled from the collaboration due to their failures an ..."
Abstract
-
Cited by 7 (3 self)
- Add to MetaCart
(Show Context)
In this paper, we present a new control method that makes some node adjustments in local areas in an effort to cover the “holes” in wireless sensor networks. Many security applications often face the problem of holes when some sensor nodes are disabled from the collaboration due to their failures and misbehavior. Affected by malicious attacks, these holes may occur dynamically and such a problem cannot be solved completely by simply deploying more redundant sensors. We propose a snake-like cascading replacement process in a local area in order to fill in the vacant area with trusted nodes. Only 1-hop neighborhood is used in our approach. Its implementations under both a passive model and an active model are discussed. The simulation results of our new control method show substantial improvements in total moving distance, total number of moves, and process converging speeds, compared with the best result known to date.
Mobility control for complete coverage in wireless sensor network
- Proceedings of the 28th International Conference on Distributed Computing Systems Workshops,pp.291-296, 2008
"... ..."
DISH: Distributed Self-Healing (in Unattended Sensor Networks)
"... Abstract. Unattended wireless sensor networks (UWSNs) operating in hostile environments face the risk of compromise. Unable to off-load collected data to a sink or some other trusted external entity, sensors must protect themselves by attempting to mitigate potential compromise and safeguarding thei ..."
Abstract
-
Cited by 5 (4 self)
- Add to MetaCart
(Show Context)
Abstract. Unattended wireless sensor networks (UWSNs) operating in hostile environments face the risk of compromise. Unable to off-load collected data to a sink or some other trusted external entity, sensors must protect themselves by attempting to mitigate potential compromise and safeguarding their data. In this paper, we focus on techniques that allow unattended sensors to recover from intrusions by soliciting help from peer sensors. We define a realistic adversarial model and show how certain simple defense methods can result in sensors re-gaining secrecy and authenticity of collected data, despite adversary’s efforts to the contrary. We present an extensive analysis and a set of simulation results that support our observations and demonstrate the effectiveness of proposed techniques. 1
Security considerations of underwater acoustic networks,” in Proceedings of 20th T ra n sm is si o n d is ta n ce ( in m et re s) percentage of nodes as CH 62 A Cluster based
- Key Management Scheme for Underwater Wireless Sensor Networks Copyright © 2015 MECS I.J. Computer Network and Information Security, 2015, 9, 54-63 International Congress on Acoustics
"... ABSTRACT Recent researches on Underwater Acoustic Network (UAN) mainly focused on the construction and management. Though these studies have covered nearly all the respects within the UAN infrastructure, few efforts have been made for its security, which is surely an important consideration when pu ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
(Show Context)
ABSTRACT Recent researches on Underwater Acoustic Network (UAN) mainly focused on the construction and management. Though these studies have covered nearly all the respects within the UAN infrastructure, few efforts have been made for its security, which is surely an important consideration when put into practices. This paper focuses to the security considerations of UAN. Within the paper, the characteristics of UAN are analyzed firstly, and comparisons between the common-used networks are performed. Thereafter, the application environments of UAN are studied and the goals and challenges of a secure UAN are investigated. Based upon the above studies, the security threats are classified according to their harm to UAN, and corresponding countermeasures against them are taken into considerations.
Forward secure communication in wireless sensor networks
- In SPC ’06: Proceedings of the 3rd International Conference on Security in Pervasive Computing (York, United Kingdom), Lecture Notes in Computer Science
"... Abstract We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
(Show Context)
Abstract We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks. As a bonus we obtain implicit weak freshness without message expansion. We take the typical resource constraints of wireless sensor networks into account. The security provisions can be superimposed on several communication models, such as the epidemic communication model. 1
On scalable security model for sensor networks protocols, in
- Schapke [eds], CIB-W78 2005, 22 nd Conference Information Technology in Construction, Dresden
, 2005
"... ABSTRACT: Distributed sensor networks meet many different barriers that reduce their efficient applicability. One of them is requirement of assurance of the information security when it is transmitted, transformed, and stored in the electronic service. It is possible to provide an appropriate level ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
(Show Context)
ABSTRACT: Distributed sensor networks meet many different barriers that reduce their efficient applicability. One of them is requirement of assurance of the information security when it is transmitted, transformed, and stored in the electronic service. It is possible to provide an appropriate level of security applying the present-day information technology. However, the level of the protection of information applied to the whole network is often much higher than it is necessary to meet potential threats. Since the level of security strongly affects the performance of whole system, the excessive protection decreases the system’s reliability and availability and, as a result, the global security of the construction. In this paper we present a model of scalable security for digital information transmission systems for the sensor network. In our model the basic element is the risk management procedure leading to an adequate protection level.
Di-Sec: A Distributed Security Framework for Heterogeneous Wireless Sensor Networks
- in In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM
, 2012
"... Abstract—Wireless Sensor Networks (WSNs) are deployed for monitoring in a range of critical domains (e.g., health care, military, critical infrastructure). Accordingly, these WSNs should be resilient to attacks. The current approach to defending against malicious threats is to develop and deploy a s ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(Show Context)
Abstract—Wireless Sensor Networks (WSNs) are deployed for monitoring in a range of critical domains (e.g., health care, military, critical infrastructure). Accordingly, these WSNs should be resilient to attacks. The current approach to defending against malicious threats is to develop and deploy a specific defense mechanism for a specific attack. However, the problem with this traditional approach to defending sensor networks is that the solution for the Jamming attack does not defend against other attacks (e.g., Sybil and Selective Forwarding). In reality, one cannot know a priori what type of attack an adversary will launch. This work addresses the challenges with the traditional approach to securing sensor networks and presents a comprehen-sive framework, Di-Sec, that can defend against all known and forthcoming attacks. At the heart of Di-Sec lies the monitoring core (M-Core), which is an extensible and lightweight layer that