Security topology in wireless sensor networks with routing optimisation pdf


















Shamsib , M. If we utilize the techniques synchronously, then may overall performance do not increase as ex- pected. This paper provides an optimization problem for energy consumption in M WSNs, where the network employs both topology control and network-coding- based multi-cast simultaneously.

This approach improves overall performance in ED comparison with employing them distinctly. The proposed optimization prob- lem is transformed into a convex problem which leads to a numerous theoretical and conceptual advantages. Simulation results show that the proposed approach decrease end-to- end delay and has a significantly lower energy consumption than conventional CE ones. Shamsi , mjnajafiarani gmail.

These numerous sensors are used similar to different sensory organs in human beings for delivering crucial information in real-time from environments and processes, where data collection is impossible previously with wired sensors [1].

Typically, wireless sensor networks are composed of low power sensor nodes and integrate general-purpose computing with heterogeneous sensing and wireless communication. Their emergence has enabled observation of the physical world at an unprecedented level of granularity. One of the most important components of a sensor node is the power unit and may be supported in most applications by a power scavenging unit such as solar cells.

These numerous sensors are used similar to different sensory organs in human beings for delivering crucial information in real-time from environments and processes, where data collection is impossible previously with wired sensors [1]. Typically, wireless sensor networks are composed of low power sensor nodes and integrate general-purpose computing with heterogeneous sensing and wireless communication.

Their emergence has enabled observation of the physical world at an unprecedented level of granularity. One of the most important components of a sensor node is the power unit and may be supported in most applications by a power scavenging unit such as solar cells. Hence, there is a major limitation in a wireless sensor networks, such as, the sensor nodes must consume extremely low power.

Also, wireless networks are subject to various kinds of attacks and wireless communication links can be eavesdropped on without noticeable effort and communication protocols on all layers are vulnerable to specific attacks. In contrast to wire-line networks, known attacks like masquerading, man-in-the-middle, and replaying of messages can easily be carried out. Hence, a fundamental issue in the design of wireless sensor networks is the reliability i.

In this context, in this thesis, the power, mobility, and task management planes that can monitor the power, movement, and task distribution among the sensor nodes are proposed. These planes help the sensor nodes coordinate the sensing task and also lower the overall power consumption. In addition, a secure topology discovery algorithm is proposed and its performance is studied for different types of node distributions.

The proposed work is the development of architecture for secure communication in mobile wireless networks. One of the most simple but robust modulation, transmission and important components of a sensor node is the power receiving techniques for the physical layer and unit and may be supported in some cases even by a provide WSNs the flexibility to balance detection power scavenging unit such as solar cells. These accuracy, sensor density and energy consumption.

Restrictions apply. Figure 2 depicts an example of such a sensor network topology. Figure 1 Components of a sensor node. The malicious nodes are prevented from eaves dropping while discovering the routes. This is The format of all communication sensor implemented by providing a secret key to all sensor nodes and the base station consists of a preamble, nodes and all the route information messages are header and payload.

The preamble is empty if the encrypted. Perimeter security is the application communication originates from the base station and chosen to illustrate the security protocol. The is directed to a sensor; otherwise it contains the following assumptions are made in this work: i The address of the sending node.

The payload contains data of the sensor network. As trusted computing environment. Figure 3 depicts the adjacent to the base station to serve as intermediaries communication format. The size of the packet is for non-adjacent nodes. In turn the ID and symmetric encryption key of each node in the base station correlates and aggregates information micro sensor network.

Similarly, each node is from each sensor. Recall the assumption that the base station is computationally 2. In this security protocol each sensor j shares a unique 64 bit Key Keyj with the base A node is called an adjacent node if it is station. The protocol provides for a multi-hop within the broadcast range of the base station. To scenario where the range of a base station is extended 8 Authorized licensed use limited to: Korea Advanced Institute of Science and Technology. In turn, the adjacent node receives the to each node.

This is the base station Fig. Figure 4 Adjacent node discovery 2. To discover the non-adjacent node, the base station uses the adjacent nodes. The base station tries all the adjacent nodes to reach the non-adjacent node. The adjacent nodes which are used to reach the non- adjacent node are noted as the route to reach the non- adjacent node.

Figure 6 Non-adjacent node discovery Algorithm After performing the secure topology discovery, the base station contains a route table that Figure 5 Network model represents a constituent of nodes and their route to reach these nodes.



0コメント

  • 1000 / 1000