Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Syracuse University

Sensor networks

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Mitigating Dos Attacks Against Broadcast Authentication In Wireless Sensor Networks, Peng Ning, An Liu, Wenliang Du Jan 2008

Mitigating Dos Attacks Against Broadcast Authentication In Wireless Sensor Networks, Peng Ning, An Liu, Wenliang Du

Electrical Engineering and Computer Science - All Scholarship

Broadcast authentication is a critical security service in wireless sensor networks. There are two general approaches for broadcast authentication in wireless sensor networks: digital signatures and µTESLA-based techniques. However, both signature-based and µTESLA-based broadcast authentication are vulnerable to Denial of Services (DoS) attacks: An attacker can inject bogus broadcast packets to force sensor nodes to perform expensive signature verifications (in case of signature-based broadcast authentication) or packet forwarding (in case of µTESLA-based broadcast authentication), thus exhausting their limited battery power. This paper presents an efficient mechanism called message specific puzzle to mitigate such DoS attacks. In addition to signature-based or …


Containing Denial-Of-Service Attacks In Broadcast Authentication In Sensor Networks, Ronghua Wang, Wenliang Du, Peng Ning Jan 2007

Containing Denial-Of-Service Attacks In Broadcast Authentication In Sensor Networks, Ronghua Wang, Wenliang Du, Peng Ning

Electrical Engineering and Computer Science - All Scholarship

Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on sensor nodes, these operations are expensive, which means sensor networks using PKC are susceptible to Denial of Service (DoS) attacks: attackers keep broadcasting bogus messages, which will incur extra costs, thus exhaust the energy of the honest nodes. In addition, the long time to verify each message using PKC increases the response time of the nodes; it is impractical for the nodes to validate each incoming message before forwarding it. In this paper we discuss …


Containing Denial-Of-Service Attacks In Broadcast Authentication In Sensor Networks, Ronghua Wang, Wenliang Du, Peng Ning Jan 2007

Containing Denial-Of-Service Attacks In Broadcast Authentication In Sensor Networks, Ronghua Wang, Wenliang Du, Peng Ning

Electrical Engineering and Computer Science - All Scholarship

Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on sensor nodes, these operations are expensive, which means sensor networks using PKC are susceptible to Denial of Service (DoS) attacks: attackers keep broadcasting bogus messages, which will incur extra costs, thus exhaust the energy of the honest nodes. In addition, the long time to verify each message using PKC increases the response time of the nodes; it is impractical for the nodes to validate each incoming message before forwarding it. In this paper we discuss …


Data Aggregation Techniques In Sensor Networks: A Survey, Ramesh Rajagopalan, Pramod K. Varshney Jan 2006

Data Aggregation Techniques In Sensor Networks: A Survey, Ramesh Rajagopalan, Pramod K. Varshney

Electrical Engineering and Computer Science - All Scholarship

Wireless sensor networks consist of sensor nodes with sensing and communication capabilities. We focus on data aggregation problems in energy constrained sensor networks. The main goal of data aggregation algorithms is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. In this paper, we present a survey of data aggregation algorithms in wireless sensor networks. We compare and contrast different algorithms on the basis of performance measures such as lifetime, latency and data accuracy. We conclude with possible future research directions.


Decision Fusion Rules In Multi-Hop Wireless Sensor Networks, Ying Lin, Biao Chen, Pramod K. Varshney Jan 2005

Decision Fusion Rules In Multi-Hop Wireless Sensor Networks, Ying Lin, Biao Chen, Pramod K. Varshney

Electrical Engineering and Computer Science - All Scholarship

We consider in this paper the decision fusion problem for a wireless sensor network (WSN) operating in a fading environment. In particular, we develop channel-aware decision fusion rules for a resource constrained WSN where decisions from local sensors may go through multi-hop transmission to reach a fusion center. Each relay node employs a binary relay scheme whereby the relay output is inferred from the channel impaired observation received from its source node. This estimated binary decision is subsequently transmitted to the next node until it reaches the fusion center. Under a flat fading channel model, we derive the optimum fusion …


Scheduling Sleeping Nodes In High Density Cluster-Based Sensor Networks, Jing Deng, Yunghsiang S. Han, Wendi B. Heinzelman, Pramod K. Varshney Jan 2004

Scheduling Sleeping Nodes In High Density Cluster-Based Sensor Networks, Jing Deng, Yunghsiang S. Han, Wendi B. Heinzelman, Pramod K. Varshney

Electrical Engineering and Computer Science - All Scholarship

In order to conserve battery power in very dense sensor networks, some sensor nodes may be put into the sleep state while other sensor nodes remain active for the sensing and communication tasks. In this paper, we study the node sleep scheduling problem in the context of clustered sensor networks. We propose and analyze the Linear Distance-based Scheduling (LDS) technique for sleeping in each cluster. The LDS scheme selects a sensor node to sleep with higher probability when it is farther away from the cluster head. We analyze the energy consumption, the sensing coverage property, and the network lifetime of …


Sensor Communication Networks Using Swarming Intelligence, Rajani Muraleedharan, Lisa Ann Osadciw Jan 2003

Sensor Communication Networks Using Swarming Intelligence, Rajani Muraleedharan, Lisa Ann Osadciw

Electrical Engineering and Computer Science - All Scholarship

Energy consumption is currently a key issue in research for future sensor networks. This paper presents a novel approach to sensor network routing based on energy consumption. The unique routing algorithm uses swarm intelligence, which is computationally efficient.


An Intelligent Deployment And Clustering Algorithm For A Distributed Mobile Sensor Network, Nojeong Heo, Pramod K. Varshney Jan 2003

An Intelligent Deployment And Clustering Algorithm For A Distributed Mobile Sensor Network, Nojeong Heo, Pramod K. Varshney

Electrical Engineering and Computer Science - All Scholarship

Energy in a wireless sensor network(WSN) is a precious resource. Deployment of mobile sensors in a WSN is an energy consuming process and it should be carefully designed. In this paper, we propose an intelligent energy-efficient deployment algorithm for cluster-based WSN by a synergistic combination of cluster structuring and a peer-to-peer deployment scheme. Performance of our algorithm is evaluated in terms of coverage, uniformity, and time and distance traveled till the algorithm converges. Our algorithm is shown to exhibit excellent performance.