Target Tracking in Wireless Sensor Network

Wireless sensor networks have the potential to become significant subsystems of engineering applications. Tracking mobile targets is an important wireless sensor network application in both military and civilian fields for applications like tracking objects or humans or guiding robots in hard to reach areas e.g. nuclear power plants etc. Often it may be necessary for sending additional resources to the vicinity of the mobile target. Tracking mobile targets involves detection and localization of the object of interest by processing the information provided by the sensing nodes along with their location.…

Read More

ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks

ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks PROJECT SYNOPSIS Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. To conquer that challenge, an active detection-based security and trust routing scheme named ActiveTrust is proposed for WSNs. The most important innovation of ActiveTrust is that it avoids black holes through…

Read More

Lightweight authentication protocol used in wireless sensor network

Lightweight authentication protocol used in wireless sensor network CRT (Chinese remainder Theorem Algorithm) implementation in NS2 TCL script Indoor positioning system is implemented using sensors that use Wi-Fi triangulation to compute the position of a mobile device in a given area. This group of sensors placed in an unattended environment form a Wireless Sensor Network (WSN). These nodes in WSN are more vulnerable to passive and active attacks than wired sensors due to limitations in resources, unrestrained environments and their broadcasting nature. Security will be a significant factor in such…

Read More

Time-Delayed Broadcasting for Defeating Inside Jammers

Time-Delayed Broadcasting for Defeating Inside Jammers Jamming-resistant broadcast communications under an internal threat model is proposed. A timedelayed broadcast scheme (TDBS) is proposed, which implements the broadcast operation as a series of unicast transmissions distributed in frequency and time. TDBS does not rely on commonly shared secrets, or the existence of jamming-immune control channels for coordinating broadcasts. Instead, each node follows a unique pseudo-noise (PN) frequency hopping sequence. Contrary to conventional PN sequences designed for multi-access systems, the PN sequences in TDBS exhibit correlation to enable broadcast. Moreover, they are…

Read More

An Efficient Distributed Trust Model for Wireless Sensor Networks

An Efficient Distributed Trust Model for Wireless Sensor Networks Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research works only take communication behavior into account to calculate sensor nodes’ trust value, which is not enough for trust evaluation due to the widespread malicious attacks. An Efficient Distributed Trust Model (EDTM) is proposed for WSNs. First, according to the number of packets received by sensor nodes, direct trust and recommendation trust are…

Read More

Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System

Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System Real-time path planning can efficiently relieve traffic congestion in urban scenarios. However, how to design an efficient path planning algorithm to achieve a globally optimal vehicle traffic control still remains a challenging problem, especially when we take drivers’ individual preferences into consideration. A hybrid intelligent transportation system (ITS) is established, i.e., a hybrid VANET enhanced ITS, which utilizes both vehicular adhoc networks (VANETs) and cellular systems of the public transportation system to enable real-time…

Read More

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such as averaging. However such aggregation is known to be highly vulnerable to node compromising attacks. Since WSN are usually unattended and without tamper resistant hardware, they are highly susceptible to such attacks. Thus, ascertaining trustworthiness of data and reputation of sensor nodes is crucial for WSN. As the performance…

Read More

A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks

A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks Security and energy efficiency are critical concerns in wireless sensor network (WSN) design. An energy-efficient secure scheme against power exhausting attacks is developed, especially the denial-of-sleep attacks, which can shorten the lifetime of WSNs rapidly. Although various media access control (MAC) protocols have been proposed to save the power and extend the lifetime of WSNs, the existing designs of MAC protocol are insufficient to protect the WSNs from denial of- sleep attacks in MAC layer. This is attributed…

Read More

Effective Key Management in Dynamic Wireless Sensor Networks

Effective Key Management in Dynamic Wireless Sensor Networks Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traffic flow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. A certificateless-effective key management (CL-EKM) protocol is proposed for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports efficient key updates when a node leaves or joins a cluster and ensures forward and backward key secrecy. The…

Read More

Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

Wormhole Attack Detection Algorithms in Wireless Network Coding Systems Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that of wormhole attacks, which undermines the performance gain of network coding. Since the underlying characteristics of network coding systems are distinctly different from traditional wireless networks, the impact of wormhole attacks and countermeasures are generally unknown. It is quantified Wormholes’ devastating harmful impact on…

Read More