An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks

An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks

Author: Adil Bashir

Publisher: GRIN Verlag

Published: 2021-07-21

Total Pages: 66

ISBN-13: 3346443078

DOWNLOAD EBOOK

Master's Thesis from the year 2013 in the subject Computer Science - Internet, New Technologies, grade: 8.12, , course: M. Tech, language: English, abstract: Wireless sensor network (WSN) is an emerging imperious leading technology of the current century that presents great promise for various pioneering applications. The use of sensor networks should keep developing, mainly in the fields of scientific, logistic, healthcare and military applications. Sensor networks interact and collect sensitive data and operate in unattended hostile environments, thus it is imperative to pay attention to the security of wireless sensor networks as they are highly prone to threats. For successful operation of the nodes, it is important to maintain the security and privacy of the transmitted data as well as the data stored at nodes. The different security protocols and models used in the wired and other wireless networks such as ad-hoc networks cannot be used in WSNs because the sensor size poses significant restrictions, mainly in terms of energy autonomy and node lifetime, as the batteries have to be too tiny. Also, the existing security protocols in these constrained networks are not sufficiently energy efficient, which is the real motivation behind this work. In this thesis, a light-weight dynamic security algorithm titled “An Energy Efficient and Dynamic Security Protocol (EEDSP)” for wireless sensor networks has been proposed and implemented at nodal level. We also implement an existing algorithm and then carry out the performance analysis of both the algorithms in terms of energy consumptions, node lifetime and memory requirements at source and intermediate nodes to verify the improvement in our protocol’s results.


Book Synopsis An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks by : Adil Bashir

Download or read book An Energy Efficient and Dynamic Security Protocol for Wireless Sensor Networks written by Adil Bashir and published by GRIN Verlag. This book was released on 2021-07-21 with total page 66 pages. Available in PDF, EPUB and Kindle. Book excerpt: Master's Thesis from the year 2013 in the subject Computer Science - Internet, New Technologies, grade: 8.12, , course: M. Tech, language: English, abstract: Wireless sensor network (WSN) is an emerging imperious leading technology of the current century that presents great promise for various pioneering applications. The use of sensor networks should keep developing, mainly in the fields of scientific, logistic, healthcare and military applications. Sensor networks interact and collect sensitive data and operate in unattended hostile environments, thus it is imperative to pay attention to the security of wireless sensor networks as they are highly prone to threats. For successful operation of the nodes, it is important to maintain the security and privacy of the transmitted data as well as the data stored at nodes. The different security protocols and models used in the wired and other wireless networks such as ad-hoc networks cannot be used in WSNs because the sensor size poses significant restrictions, mainly in terms of energy autonomy and node lifetime, as the batteries have to be too tiny. Also, the existing security protocols in these constrained networks are not sufficiently energy efficient, which is the real motivation behind this work. In this thesis, a light-weight dynamic security algorithm titled “An Energy Efficient and Dynamic Security Protocol (EEDSP)” for wireless sensor networks has been proposed and implemented at nodal level. We also implement an existing algorithm and then carry out the performance analysis of both the algorithms in terms of energy consumptions, node lifetime and memory requirements at source and intermediate nodes to verify the improvement in our protocol’s results.


Energy Management in Wireless Sensor Networks

Energy Management in Wireless Sensor Networks

Author: Youcef Touati

Publisher: Elsevier

Published: 2017-03-29

Total Pages: 146

ISBN-13: 0081021178

DOWNLOAD EBOOK

Energy Management in Wireless Sensor Networks discusses this unavoidable issue in the application of Wireless Sensor Networks (WSN). To guarantee efficiency and durability in a network, the science must go beyond hardware solutions and seek alternative software solutions that allow for better data control from the source to delivery. Data transfer must obey different routing protocols, depending on the application type and network architecture. The correct protocol should allow for fluid information flow, as well as optimizing power consumption and resources – a challenge faced by dense networks. The topics covered in this book provide answers to these needs by introducing and exploring computer-based tools and protocol strategies for low power consumption and the implementation of routing mechanisms which include several levels of intervention, ranging from deployment to network operation. Explores ways to manage energy consumption during the design and implementation of WSN Helps users implement an increase in network longevity Presents intrinsic characteristics of wireless sensor networks


Book Synopsis Energy Management in Wireless Sensor Networks by : Youcef Touati

Download or read book Energy Management in Wireless Sensor Networks written by Youcef Touati and published by Elsevier. This book was released on 2017-03-29 with total page 146 pages. Available in PDF, EPUB and Kindle. Book excerpt: Energy Management in Wireless Sensor Networks discusses this unavoidable issue in the application of Wireless Sensor Networks (WSN). To guarantee efficiency and durability in a network, the science must go beyond hardware solutions and seek alternative software solutions that allow for better data control from the source to delivery. Data transfer must obey different routing protocols, depending on the application type and network architecture. The correct protocol should allow for fluid information flow, as well as optimizing power consumption and resources – a challenge faced by dense networks. The topics covered in this book provide answers to these needs by introducing and exploring computer-based tools and protocol strategies for low power consumption and the implementation of routing mechanisms which include several levels of intervention, ranging from deployment to network operation. Explores ways to manage energy consumption during the design and implementation of WSN Helps users implement an increase in network longevity Presents intrinsic characteristics of wireless sensor networks


Sensor Network Protocols

Sensor Network Protocols

Author: Imad Mahgoub

Publisher: CRC Press

Published: 2018-10-08

Total Pages: 248

ISBN-13: 1420006347

DOWNLOAD EBOOK

Sensor networks continue to grow in importance for modern communication networks. Communication protocols are at the core of these networks, determining their ability to function, their capabilities, and the environments in which they are able to operate. In chapters carefully selected from the popular Handbook of Sensor Networks, Sensor Network Protocols supplies a sharply focused reference on protocols, security, data processing, and energy management in communication sensor networks that is ideal for specialists in the field. Providing a succinct guide to the protocols currently used in advanced sensor networks, this book focuses on four main areas: routing protocols; data gathering and processing; security and reliability; and energy management. The book opens with a survey of the challenges and opportunities facing the field. Then, expert contributors authoritatively discuss routing technologies, next-generation enabling technologies, comparative study of energy-efficient protocols for wireless sensor networks, techniques to reduce computation and communication energy consumption, energy-aware routing, localized algorithms for sensor networks, and much more. Sensor Network Protocols details the techniques and technologies that are at the heart of modern sensor networks. It is an ideal reference for anyone interested in designing, planning, or building emerging sensor and communications networks.


Book Synopsis Sensor Network Protocols by : Imad Mahgoub

Download or read book Sensor Network Protocols written by Imad Mahgoub and published by CRC Press. This book was released on 2018-10-08 with total page 248 pages. Available in PDF, EPUB and Kindle. Book excerpt: Sensor networks continue to grow in importance for modern communication networks. Communication protocols are at the core of these networks, determining their ability to function, their capabilities, and the environments in which they are able to operate. In chapters carefully selected from the popular Handbook of Sensor Networks, Sensor Network Protocols supplies a sharply focused reference on protocols, security, data processing, and energy management in communication sensor networks that is ideal for specialists in the field. Providing a succinct guide to the protocols currently used in advanced sensor networks, this book focuses on four main areas: routing protocols; data gathering and processing; security and reliability; and energy management. The book opens with a survey of the challenges and opportunities facing the field. Then, expert contributors authoritatively discuss routing technologies, next-generation enabling technologies, comparative study of energy-efficient protocols for wireless sensor networks, techniques to reduce computation and communication energy consumption, energy-aware routing, localized algorithms for sensor networks, and much more. Sensor Network Protocols details the techniques and technologies that are at the heart of modern sensor networks. It is an ideal reference for anyone interested in designing, planning, or building emerging sensor and communications networks.


ENERGY EFFICIENT SECURITY FOR WIRELESS SENSOR NETWORKS.

ENERGY EFFICIENT SECURITY FOR WIRELESS SENSOR NETWORKS.

Author: Abidalrahman Moh'd

Publisher:

Published: 2013

Total Pages:

ISBN-13:

DOWNLOAD EBOOK


Book Synopsis ENERGY EFFICIENT SECURITY FOR WIRELESS SENSOR NETWORKS. by : Abidalrahman Moh'd

Download or read book ENERGY EFFICIENT SECURITY FOR WIRELESS SENSOR NETWORKS. written by Abidalrahman Moh'd and published by . This book was released on 2013 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:


Certain Power Management Algorithms for Wireless Sensor Networks by Energy Efficient Data Transmission, Security and Node Deployment

Certain Power Management Algorithms for Wireless Sensor Networks by Energy Efficient Data Transmission, Security and Node Deployment

Author: Linoy A Tharakan

Publisher: GRIN Verlag

Published: 2018-02-12

Total Pages: 134

ISBN-13: 3668635242

DOWNLOAD EBOOK

Doctoral Thesis / Dissertation from the year 2017 in the subject Electrotechnology, grade: PhD, , course: Doctor of Philosophy, language: English, abstract: Wireless Sensor Networks (WSNs) is fast emerging as prominent study area that attracting considerable research attention globally. The field has seen tremendous development in design and development of application related interfaces with sensor networks. Sensor network finds applications in several domains such as medical, military, home networks, space and so on. Many researchers strongly believe that WSNs can become as important as the internet in the near future. Just as the internet allows access to digital information anywhere, WSNs could easily provide remote interaction with the physical world. It is going to be the backbone of Ubiquitous Computing (UBICOMP).Through local collaboration among sensors, elimination of duplicate data, participation of relevant nodes in the given task etc. can produce a significant difference in energy conservation, thereby increasing the life time of the sensor network. As the number of nodes increases, data security becomes the most challenging part of the network. The intruders can hack the data any time during processing, transmission or at the receiver end. So, as a popular approach data encryption is the most commendable approach in today’s network. Asymmetric key encryption consumes more energy in processing and so not recommended for WSNs. Symmetric key encryption gives better performance with respect to asymmetric key encryption in WSN applications. It uses less computational power due to relatively effortless mathematical operations, and eventually spends less power. This thesis also proposes a symmetric data encryption through Tabulation method of Boolean function reductionfor the WSNs for secure data transmission. It also suggests a new secure approach, SEEMd, Security Enabled Energy Efficient Middleware algorithmfor the critical data sensing and gives a second chance to the nodes before it falls into to sleep mode for energy management. WSNs are designed for applications which range from small-size healthcare surveillance systems to large-scale agricultural monitoring or environmental monitoring. Thus, any WSN deployment, data aggregation, processing and communication have to assure minimum Quality of Service (QoS) in the network from application to application. In this circumstances, the proposed algorithms in this thesis proved to be efficient and reliable in energy saving and life time enhancement.


Book Synopsis Certain Power Management Algorithms for Wireless Sensor Networks by Energy Efficient Data Transmission, Security and Node Deployment by : Linoy A Tharakan

Download or read book Certain Power Management Algorithms for Wireless Sensor Networks by Energy Efficient Data Transmission, Security and Node Deployment written by Linoy A Tharakan and published by GRIN Verlag. This book was released on 2018-02-12 with total page 134 pages. Available in PDF, EPUB and Kindle. Book excerpt: Doctoral Thesis / Dissertation from the year 2017 in the subject Electrotechnology, grade: PhD, , course: Doctor of Philosophy, language: English, abstract: Wireless Sensor Networks (WSNs) is fast emerging as prominent study area that attracting considerable research attention globally. The field has seen tremendous development in design and development of application related interfaces with sensor networks. Sensor network finds applications in several domains such as medical, military, home networks, space and so on. Many researchers strongly believe that WSNs can become as important as the internet in the near future. Just as the internet allows access to digital information anywhere, WSNs could easily provide remote interaction with the physical world. It is going to be the backbone of Ubiquitous Computing (UBICOMP).Through local collaboration among sensors, elimination of duplicate data, participation of relevant nodes in the given task etc. can produce a significant difference in energy conservation, thereby increasing the life time of the sensor network. As the number of nodes increases, data security becomes the most challenging part of the network. The intruders can hack the data any time during processing, transmission or at the receiver end. So, as a popular approach data encryption is the most commendable approach in today’s network. Asymmetric key encryption consumes more energy in processing and so not recommended for WSNs. Symmetric key encryption gives better performance with respect to asymmetric key encryption in WSN applications. It uses less computational power due to relatively effortless mathematical operations, and eventually spends less power. This thesis also proposes a symmetric data encryption through Tabulation method of Boolean function reductionfor the WSNs for secure data transmission. It also suggests a new secure approach, SEEMd, Security Enabled Energy Efficient Middleware algorithmfor the critical data sensing and gives a second chance to the nodes before it falls into to sleep mode for energy management. WSNs are designed for applications which range from small-size healthcare surveillance systems to large-scale agricultural monitoring or environmental monitoring. Thus, any WSN deployment, data aggregation, processing and communication have to assure minimum Quality of Service (QoS) in the network from application to application. In this circumstances, the proposed algorithms in this thesis proved to be efficient and reliable in energy saving and life time enhancement.


Improvised Energy Efficient Routing Protocol based on Ant Colony Optimization (ACO) for Wireless Sensor Networks

Improvised Energy Efficient Routing Protocol based on Ant Colony Optimization (ACO) for Wireless Sensor Networks

Author: Anand Nayyar

Publisher: GRIN Verlag

Published: 2017-12-22

Total Pages: 166

ISBN-13: 3668599211

DOWNLOAD EBOOK

Doctoral Thesis / Dissertation from the year 2017 in the subject Computer Science - Miscellaneous, , course: Ph.D Computer Science, language: English, abstract: Routing and Energy Efficiency is regarded as highly challenging area of Sensor networks. Significant advancements in Wireless Sensor Networks (WSNs) opens doors for wide implementation in real-time applications like Industrial Monitoring, Smart Cities development, Underwater monitoring operations, tracking objects and many more. Energy Efficient routing is regarded as the most challenging task. Sensor networks mostly operate in complex and dynamic environments and routing becomes tedious task to maintain as the network size increases. Lots of routing protocols- Reactive, Proactive and Hybrid are proposed by researchers but every protocol faces some limitations in terms of energy, routing, packet delivery ratio and security. Therefore, to overcome all the routing issues, the trend has shifted to Biological based Algorithms like Swarm Intelligence based techniques. Ant Colony Optimization based routing protocols have demonstrated exceptional results in terms of performance when applied to WSN routing. This thesis outlines routing protocols in sensor networks, highlight the concept of Swarm Intelligence and presents various Ant Colony Optimization based routing protocols for sensor networks. In addition to this, we present Ant Colony based Energy Efficient routing protocol (IEEMARP = Improvised Energy Efficient Multipath Ant Based Routing Protocol) for sensor networks. The proposed protocol takes into consideration various performance metrics like Packet Delivery Ratio, Throughput, Energy Efficiency, Routing Overhead and End-to-End delay. Proposed protocol is simulated and tested using NS-2.35 simulator. Simulation based results stated that IEEMARP routing protocol is overall 16% more efficient in terms of Packet delivery ratio, Energy Efficiency, Throughput, Routing Overhead and End-to-End delay as compared to other ACO based routing protocols. In addition to this, IEEMARP is highly reliable protocol to ensure timely delivery with acknowledgement packet exchange between source node to sink node and vice versa and also combats the issue of congestion and packet dropping to large extent.


Book Synopsis Improvised Energy Efficient Routing Protocol based on Ant Colony Optimization (ACO) for Wireless Sensor Networks by : Anand Nayyar

Download or read book Improvised Energy Efficient Routing Protocol based on Ant Colony Optimization (ACO) for Wireless Sensor Networks written by Anand Nayyar and published by GRIN Verlag. This book was released on 2017-12-22 with total page 166 pages. Available in PDF, EPUB and Kindle. Book excerpt: Doctoral Thesis / Dissertation from the year 2017 in the subject Computer Science - Miscellaneous, , course: Ph.D Computer Science, language: English, abstract: Routing and Energy Efficiency is regarded as highly challenging area of Sensor networks. Significant advancements in Wireless Sensor Networks (WSNs) opens doors for wide implementation in real-time applications like Industrial Monitoring, Smart Cities development, Underwater monitoring operations, tracking objects and many more. Energy Efficient routing is regarded as the most challenging task. Sensor networks mostly operate in complex and dynamic environments and routing becomes tedious task to maintain as the network size increases. Lots of routing protocols- Reactive, Proactive and Hybrid are proposed by researchers but every protocol faces some limitations in terms of energy, routing, packet delivery ratio and security. Therefore, to overcome all the routing issues, the trend has shifted to Biological based Algorithms like Swarm Intelligence based techniques. Ant Colony Optimization based routing protocols have demonstrated exceptional results in terms of performance when applied to WSN routing. This thesis outlines routing protocols in sensor networks, highlight the concept of Swarm Intelligence and presents various Ant Colony Optimization based routing protocols for sensor networks. In addition to this, we present Ant Colony based Energy Efficient routing protocol (IEEMARP = Improvised Energy Efficient Multipath Ant Based Routing Protocol) for sensor networks. The proposed protocol takes into consideration various performance metrics like Packet Delivery Ratio, Throughput, Energy Efficiency, Routing Overhead and End-to-End delay. Proposed protocol is simulated and tested using NS-2.35 simulator. Simulation based results stated that IEEMARP routing protocol is overall 16% more efficient in terms of Packet delivery ratio, Energy Efficiency, Throughput, Routing Overhead and End-to-End delay as compared to other ACO based routing protocols. In addition to this, IEEMARP is highly reliable protocol to ensure timely delivery with acknowledgement packet exchange between source node to sink node and vice versa and also combats the issue of congestion and packet dropping to large extent.


Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks

Author: Sagayam, K. Martin

Publisher: IGI Global

Published: 2020-06-12

Total Pages: 405

ISBN-13: 1799850692

DOWNLOAD EBOOK

Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.


Book Synopsis Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks by : Sagayam, K. Martin

Download or read book Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks written by Sagayam, K. Martin and published by IGI Global. This book was released on 2020-06-12 with total page 405 pages. Available in PDF, EPUB and Kindle. Book excerpt: Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.


Architectures and Protocols for Secure and Energy-Efficient Integration of Wireless Sensor Networks with the Internet of Things

Architectures and Protocols for Secure and Energy-Efficient Integration of Wireless Sensor Networks with the Internet of Things

Author: Malisa Vucinic

Publisher:

Published: 2015

Total Pages: 0

ISBN-13:

DOWNLOAD EBOOK

Our research explores the intersection of academic, industrial and standardization spheres to enable secure and energy-efficient Internet of Things. We study standards-based security solutions bottom-up and first observe that hardware accelerated cryptography is a necessity for Internet of Things devices, as it leads to reductions in computational time, as much as two orders of magnitude. Overhead of the cryptographic primitives is, however, only one of the factors that influences the overall performance in the networking context. To understand the energy - security tradeoffs, we evaluate the effect of link-layer security features on the performance of Wireless Sensors Networks. We show that for practical applications and implementations, link-layer security features introduce a negligible degradation on the order of a couple of percent, that is often acceptable even for the most energy-constrained systems, such as those based on harvesting.Because link-layer security puts trust on each node on the communication path consisted of multiple, potentially compromised devices, we protect the information flows by end-to-end security mechanisms. We therefore consider Datagram Transport Layer Security (DTLS) protocol, the IETF standard for end-to-end security in the Internet of Things and contribute to the debate in both the standardization and research communities on the applicability of DTLS to constrained environments. We provide a thorough performance evaluation of DTLS in different duty-cycled networks through real-world experimentation, emulation and analysis. Our results demonstrate surprisingly poor performance of DTLS in networks where energy efficiency is paramount. Because a DTLS client and a server exchange many signaling packets, the DTLS handshake takes between a handful of seconds and several tens of seconds, with similar results for different duty cycling protocols.But apart from its performance issues, DTLS was designed for point-to-point communication dominant in the traditional Internet. The novel Constrained Ap- plication Protocol (CoAP) was tailored for constrained devices by facilitating asynchronous application traffic, group communication and absolute need for caching. The security architecture based on DTLS is, however, not able to keep up and advanced features of CoAP simply become futile when used in conjunction with DTLS. We propose an architecture that leverages the security concepts both from content-centric and traditional connection-oriented approaches. We rely on secure channels established by means of DTLS for key exchange, but we get rid of the notion of “state” among communicating entities by leveraging the concept of object security. We provide a mechanism to protect from replay attacks by coupling the capability-based access control with network communication and CoAP header. OSCAR, our object-based security architecture, intrinsically supports caching and multicast, and does not affect the radio duty-cycling operation of constrained devices. Ideas from OSCAR have already found their way towards the Internet standards and are heavily discussed as potential solutions for standardization.


Book Synopsis Architectures and Protocols for Secure and Energy-Efficient Integration of Wireless Sensor Networks with the Internet of Things by : Malisa Vucinic

Download or read book Architectures and Protocols for Secure and Energy-Efficient Integration of Wireless Sensor Networks with the Internet of Things written by Malisa Vucinic and published by . This book was released on 2015 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: Our research explores the intersection of academic, industrial and standardization spheres to enable secure and energy-efficient Internet of Things. We study standards-based security solutions bottom-up and first observe that hardware accelerated cryptography is a necessity for Internet of Things devices, as it leads to reductions in computational time, as much as two orders of magnitude. Overhead of the cryptographic primitives is, however, only one of the factors that influences the overall performance in the networking context. To understand the energy - security tradeoffs, we evaluate the effect of link-layer security features on the performance of Wireless Sensors Networks. We show that for practical applications and implementations, link-layer security features introduce a negligible degradation on the order of a couple of percent, that is often acceptable even for the most energy-constrained systems, such as those based on harvesting.Because link-layer security puts trust on each node on the communication path consisted of multiple, potentially compromised devices, we protect the information flows by end-to-end security mechanisms. We therefore consider Datagram Transport Layer Security (DTLS) protocol, the IETF standard for end-to-end security in the Internet of Things and contribute to the debate in both the standardization and research communities on the applicability of DTLS to constrained environments. We provide a thorough performance evaluation of DTLS in different duty-cycled networks through real-world experimentation, emulation and analysis. Our results demonstrate surprisingly poor performance of DTLS in networks where energy efficiency is paramount. Because a DTLS client and a server exchange many signaling packets, the DTLS handshake takes between a handful of seconds and several tens of seconds, with similar results for different duty cycling protocols.But apart from its performance issues, DTLS was designed for point-to-point communication dominant in the traditional Internet. The novel Constrained Ap- plication Protocol (CoAP) was tailored for constrained devices by facilitating asynchronous application traffic, group communication and absolute need for caching. The security architecture based on DTLS is, however, not able to keep up and advanced features of CoAP simply become futile when used in conjunction with DTLS. We propose an architecture that leverages the security concepts both from content-centric and traditional connection-oriented approaches. We rely on secure channels established by means of DTLS for key exchange, but we get rid of the notion of “state” among communicating entities by leveraging the concept of object security. We provide a mechanism to protect from replay attacks by coupling the capability-based access control with network communication and CoAP header. OSCAR, our object-based security architecture, intrinsically supports caching and multicast, and does not affect the radio duty-cycling operation of constrained devices. Ideas from OSCAR have already found their way towards the Internet standards and are heavily discussed as potential solutions for standardization.


Introductory Concepts of Wireless Sensor Network. Theory and Applications

Introductory Concepts of Wireless Sensor Network. Theory and Applications

Author: Dac-Nhuong Le

Publisher: GRIN Verlag

Published: 2018-01-02

Total Pages: 265

ISBN-13: 3668601801

DOWNLOAD EBOOK

Document from the year 2018 in the subject Instructor Plans: Computing / Data Processing / IT / Telecommunication, , course: Wireless Sensor Network, language: English, abstract: This book, Introductory Concepts of Wireless Sensor Network provides the details study of Wireless Sensor Network Introduction, Application, Middleware and basic concept of cloud computing with WSN. This book also uses the Data Transmission concepts for secure data transmission over the wireless sensor network in distributed environment. This book is useful for undergraduates, postgraduates and research scholar students for their course work and research projects in the field of engineering, science and technology. The text is organized into ten chapters, Chapter 1 and Chapter 2 provides Basic concept of wireless sensor network and their application in real life. Chapter 3 and Chapter 4 Routing in Cluster Based Wireless Sensor Networks and Cluster Based Distribution Routing Protocol for wireless sensor network. Chapter 5 and Chapter 6, includes MAC Protocol for WSN & MANET and Routing Protocols in Wireless Sensor Network. Chapter 7 and Chapter 8, give the brief introduction of Transport Control Protocols for WSN and different Middleware’s for WSN. Chapter 9 and Chapter 10 give brief Concept of Cloud Computing with WSN and Data Transmission over the WSN. Finally, this book includes un-solved problems, exercise and list of projects that are useful for both graduate and post-graduate students.


Book Synopsis Introductory Concepts of Wireless Sensor Network. Theory and Applications by : Dac-Nhuong Le

Download or read book Introductory Concepts of Wireless Sensor Network. Theory and Applications written by Dac-Nhuong Le and published by GRIN Verlag. This book was released on 2018-01-02 with total page 265 pages. Available in PDF, EPUB and Kindle. Book excerpt: Document from the year 2018 in the subject Instructor Plans: Computing / Data Processing / IT / Telecommunication, , course: Wireless Sensor Network, language: English, abstract: This book, Introductory Concepts of Wireless Sensor Network provides the details study of Wireless Sensor Network Introduction, Application, Middleware and basic concept of cloud computing with WSN. This book also uses the Data Transmission concepts for secure data transmission over the wireless sensor network in distributed environment. This book is useful for undergraduates, postgraduates and research scholar students for their course work and research projects in the field of engineering, science and technology. The text is organized into ten chapters, Chapter 1 and Chapter 2 provides Basic concept of wireless sensor network and their application in real life. Chapter 3 and Chapter 4 Routing in Cluster Based Wireless Sensor Networks and Cluster Based Distribution Routing Protocol for wireless sensor network. Chapter 5 and Chapter 6, includes MAC Protocol for WSN & MANET and Routing Protocols in Wireless Sensor Network. Chapter 7 and Chapter 8, give the brief introduction of Transport Control Protocols for WSN and different Middleware’s for WSN. Chapter 9 and Chapter 10 give brief Concept of Cloud Computing with WSN and Data Transmission over the WSN. Finally, this book includes un-solved problems, exercise and list of projects that are useful for both graduate and post-graduate students.


Wireless Sensor Networks: Security,Routing and Energy Efficiency

Wireless Sensor Networks: Security,Routing and Energy Efficiency

Author: Subhabrata Barman

Publisher: LAP Lambert Academic Publishing

Published: 2019-10-23

Total Pages: 104

ISBN-13: 9783659773921

DOWNLOAD EBOOK

To get low cost solution of real-world problems, wireless sensor network is widely used. As sensors are low cost tiny device with limited storage, computational capability and power, energy efficient protocol is needed in the applications of wireless sensor network. On the other hand security is one of the main concerned when sensors will communicate to each other securely. Id-Based scheme provides that security, clustering approach provides an energy efficient topology control and cluster head and route selection provides an energy efficient data routing mechanism. In this paper we will propose a framework of three phases: in first phase we will propose an algorithm for finding minimum connected dominating set using maximal independent set for unit disk graph. In second phase we will propose an algorithm for cluster head and path selection and in last phase we will proposed an Id-Based scheme to provide secure communication within the network.


Book Synopsis Wireless Sensor Networks: Security,Routing and Energy Efficiency by : Subhabrata Barman

Download or read book Wireless Sensor Networks: Security,Routing and Energy Efficiency written by Subhabrata Barman and published by LAP Lambert Academic Publishing. This book was released on 2019-10-23 with total page 104 pages. Available in PDF, EPUB and Kindle. Book excerpt: To get low cost solution of real-world problems, wireless sensor network is widely used. As sensors are low cost tiny device with limited storage, computational capability and power, energy efficient protocol is needed in the applications of wireless sensor network. On the other hand security is one of the main concerned when sensors will communicate to each other securely. Id-Based scheme provides that security, clustering approach provides an energy efficient topology control and cluster head and route selection provides an energy efficient data routing mechanism. In this paper we will propose a framework of three phases: in first phase we will propose an algorithm for finding minimum connected dominating set using maximal independent set for unit disk graph. In second phase we will propose an algorithm for cluster head and path selection and in last phase we will proposed an Id-Based scheme to provide secure communication within the network.