Wireless sensor networks (WSNs) are presented their abilities in many vital applications such as wildlife tracking, checking heart rates of human, military applications, traffic monitoring, etc, [1]. Wireless sensors have limited resources, including limited storage, limited processing facility, and communication capability. In addition, each sensor node is powered by a battery, which has a finite size and cannot be recharged or replaced due to environmental conditions [2-5]. Actually, Sensor nodes depend on their finite resources to survive. Due to these reasons, it is important to enhance the energy efficiency of nodes to improve the quality of the application service REF. The first problem of WSNs is to minimize energy consumption in …show more content…
Since data are transmitted wirelessly between sensor nodes, it is usually prone to eavesdropping and interception. It is important to maintain the privacy of data among sensor nodes even from trusted cooperating sensor nodes of the WSNs. It is necessary to prevent recovering the privacy of the data, even it is overheard or decrypted by the adversaries.
The last problem of WSNs is data integrity REF . Data integrity is defined as the correctness of messages without injection a false data by an adversary. It is ensured that the received message is not modified or altered through its transmission by noise or by an adversary. If data message is polluted by a noise it can be handled by using some mechanisms such as Cyclic Redundancy Checking (CRC). This unintentional process is out of our scope of this paper. The data aggregation result is essential for making a critical decision, thus it is required to verify data aggregation result before accepting it.
Generally, the success of wireless sensor network depends on a vital secure data aggregation technique that accomplishes the security goals [8]. However, the security models and protocols of sensor networks are different from those that are used in other types of networks due to their hardware resources and power constraints. Therefore, efficient, secure data aggregation techniques are required to deal with energy efficiency, data accuracy, latency and protecting data.
In this paper, we introduce a better
3) Secure data aggregation: Fine grain sensing is one of the important compensation of a wireless sensor network which is provided by the large and dense sets of nodes .So to avoid overwhelming amounts of traffic, the sensed values must be aggregated and the aggregation may take place in many places in the network depending on the architecture of the wireless sensor network. For example, the system may average the temperature of a geographic region, combine sensor values to compute the location and velocity of a moving object, or aggregate data to avoid false alarms in real-world event detection. All aggregation locations must be secured [8].
A WSN is a type of wireless networks that consists of collection sensor nodes which are tiny devices. Each sensor node of the network has different processing capability. It may contain multiple types of memory (program, data and flash memories), have a RF transceiver, have a power source (e.g., batteries and solar cells), and accommodate various sensors and actuators. The nodes communicate wirelessly and often self-organize after being deployed in an ad hoc fashion [13, 14]. Optimum need of each sensor node is to maximize its own utility function. Also the whole network requires resource assignments balance to perform in a useful and efficient way. This chapter presents a brief survey on WSNs showing its types, characterizing features, protocols and applications.
Abstract— Wireless Sensor Networks (WSN) introduce a new way to interact with the physical environment. The security in WSNs became an attractive area of research. WSNs are susceptible to a wide range of malicious attacks. At present ECC is considered for secure communications, which is having good potential for WSN security due to its smaller key size and its high strength of security. Unfortunately, the execution time of ECC is more which is not suitable for more number of applications. A number of other security mechanisms have been proposed for sensor networks to provide data confidentiality, namely Advanced Encryption Standard (AES) and Data Encryption Standard (DES). In this paper, we propose an algorithm, which is compared and analyzed with the existing ECC and AES to provide better security with authenticated sensor nodes. The authentication is done with a secret code. The proposed algorithm will ensure the secure communication with authenticated devices. The analysis results shows that the scheme works better than the common existent schemes with better utilization of available memory.
Abstract—Wireless Sensor Network (WSN) is basically a wireless network in which sensor nodes are distributed in any environment condition, to collect the data or information such as temperature, pressure, wind, sea level etc. and accordingly data or information will be passed to the main location. Reliable Trust and Reputation of a node stands for the measure of trust over a certain period of time which can be useful to evaluate the risk of attack from that particular node. We have combined all these parameters in order to risk of attack from a particular node.
On Piotrowski et al\cite{Piotrowski}, the authors present a collaborative data storage (tinyDSM) middleware that addresses the common problems of store data on wireless sensor networks (WSN) using data replication on nodes of the network. However, in the proposal, the decision of the node to assume the role of data replicators is static and uses a random criterion depends only on the number of nodes and density of the network. It's created some problems if that node disappears from the network.
The main goal of communication protocols in WSNs is to maximize energy efficiency in order to
A wireless sensor network (WSN) is a collection of large number of sensor nodes and at least one base station. The sensor node is an autonomous small device that consists of mainly four units that are sensing, information gathering, processing and communication. In wireless sensor network there of many issues that are much affects in communication, processing and in deployments. The main issue is its coverage and connectivity problem. Most of the times communications does not prohibited properly amongst sensors and base station due lacking of ranges problem. Full coverage and connectivity means that every location in the field is covered by at least one node and
In this paper, I will mainly focus on analyzing and evaluating the current Wireless Sensor Networks (WSN). This paper starts with an overview on fundamentals of WSNs, by providing necessary background to understand
Wireless sensor networks typically consist of a large number of sensor nodes with limited onboard battery resources which are difficult to recharge or replace. Thus the reduction of energy consumption for end-to-end data rate and maximization of network lifetime have become chief research concern. In recent years, many techniques have been proposed for improving the energy efficiency in wireless sensor networks. Among these techniques, V-MIMO technique has been considered as one of the effective ways to save energy. In WSN a node has two communication related energy consuming roles, one role is to serve as a packet generating source node (SN), and the other role is to relay packets for the other nodes, which are both energy consuming operations. This is why the energy minimization is required to extend the lifetime of the WSN.
Wireless sensor nodes consists of three pars first one is wireless means without wires second one is sensor mean our nodes or data sensing process third and last one is networks means connection of these nodes to form a network to communicate and report data. When we concern its quality of service it may become too wide part of research so we are promised to work only in energy efficient protocols. The reason behind wireless
Abstract-Key management is one of the most important issues of any secure communication with the increasing demand for the security in wireless sensor networks (WSNs) it is important to introduce the secure and reliable key management in the WSNs.Data confidentiality and authenticity are critical in WSNs. Key management objective is to secure and keep up secure connections between sensor nodes at network formation and running stages.
In this study, we have discussed about the data acquisition from wireless sensor networks having some faulty nodes. Here, we perform removal of transfaulty nodes from a defined wireless sensor network and acquire the efficient and reliable data from the nodes.
ABSTRACT: Wireless sensor networks is a self-configured network means any node can join it or leave it at any time. it is a self-healing and self-organizing. Self-healing networks allow nodes to reconfigure their link associations and find other pathways around powered-down nodes or failed nodes. Self-organizing allows a network automatically join new node without the need for manual interference. In this paper, we are using actor nodes to solve energy hole problem so that we can reduce energy consumption and can enhance throughput of network.
F. L. Lewis et al. [22] conducted a review on wireless sensor networks in 2004. This paper performed a review on wireless sensor network technologies, protocols and applications. In future, conduct a review based on wireless sensor network routing techniques, power consumption techniques, IEEE standards and MAC protocols.
A wireless sensor network (WSN) is a network of nodes that sense and control the environment providing interaction between the machines and the surrounding environment. It is formed by large number of sensors nodes where each node is equipped with sensor to detect physical characteristic such as temperature, pressure, weight etc. [2]. WSN is a new revolutionary method which gathers information from sensor nodes providing a reliable and efficient network. With the growing technology of sensors, WSNs will become the key for internet of things. The current focus of sensor network is mainly on networking technology comprising of dynamic environment and the sensor nodes. The new research program of SenseIT provided the sensor networking with new capabilities such