2010 ◽  
Vol 159 ◽  
pp. 29-34
Author(s):  
Shu Ming Xiong ◽  
Xiao Qian Qu ◽  
Yong Zhao Zhan ◽  
Xin Sheng Wang ◽  
Liang Min Wang

Due to the node failures incurred by intrusion threat, a wireless sensor networks will initiate topology re-generation, which is based on correct availability evaluation of current intrusion-tolerant topology. The paper proposes an availability evaluation model based on semi-Markov process (SMP) to estimate topology availability of the intrusion-tolerant topology concerning the effects from intrusion behaviors. In view of some limitations of node computation ability and storage ability, this model reduces the complexities resulting from modeling the different intrusion threats and is set up on the uniform intruding results to simplify the model design. Using the DTMC model embedded in SMP topology availability is computed and finally we analyze the sensitivity to parameters in the model.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3621 ◽  
Author(s):  
Peio Lopez-Iturri ◽  
Mikel Celaya-Echarri ◽  
Leyre Azpilicueta ◽  
Erik Aguirre ◽  
José Astrain ◽  
...  

In this work, the combination of capabilities provided by Wireless Sensor Networks (WSN) with parameter observation in a school garden is employed in order to provide an environment for school garden integration as a complementary educational activity in primary schools. Wireless transceivers with energy harvesting capabilities are employed in order to provide autonomous system operation, combined with an ad-hoc implemented application called MySchoolGardenApp, based on a modular software architecture. The system enables direct parameter observation, data analysis and processing capabilities, which can be employed by students in a cloud based platform. Providing remote data access allows the adaptation of content to specific classroom/homework needs. The proposed monitoring WSN has been deployed in an orchard located in the schoolyard of a primary school, which has been built with EnOcean’s energy harvesting modules, providing an optimized node device as well network layout. For the assessment of the wireless link quality and the deployment of the modules, especially the central module which needs to receive directly the signals of all the sensor modules, simulation results obtained by an in-house developed 3D Ray Launching deterministic method have been used, providing coverage/capacity estimations applicable to the specific school environment case. Preliminary trials with MySchoolGardenApp have been performed, showing the feasibility of the proposed platform as an educational resource in schools, with application in specific natural science course content, development of technological skills and the extension of monitoring capabilities to new context-aware applications.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Zhiming Zhang ◽  
Yu Yang ◽  
Wei Yang ◽  
Fuying Wu ◽  
Ping Li ◽  
...  

The current detection schemes of malicious nodes mainly focus on how to detect and locate malicious nodes in a single path; however, for the reliability of data transmission, many sensor data are transmitted by multipath in wireless sensor networks. In order to detect and locate malicious nodes in multiple paths, in this paper, we present a homomorphic fingerprinting-based detection and location of malicious nodes (HFDLMN) scheme in wireless sensor networks. In the HFDLMN scheme, using homomorphic fingerprint and coding technology, the original data is divided into n packets and sent to the base station along n paths, respectively; the base station determines whether there are malicious nodes in each path by verifying the validity of the packets; if there are malicious nodes in one or more paths, the location algorithm of the malicious node is implemented to locate the specific malicious nodes in the path; if all the packets are valid, the original data is recovered. The HFDLMN scheme does not need any complex evaluation model to evaluate and calculate the trust value of the node, nor any monitoring nodes. Theoretical analysis results show that the HFDLMN scheme is secure and effective. The simulation results demonstrate promising outcomes with respect to key parameters such as the detection probability of the malicious path and the locating probability of the malicious node.


Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5164
Author(s):  
Changsun Shin ◽  
Meonghun Lee

The swarm intelligence (SI)-based bio-inspired algorithm demonstrates features of heterogeneous individual agents, such as stability, scalability, and adaptability, in distributed and autonomous environments. The said algorithm will be applied to the communication network environment to overcome the limitations of wireless sensor networks (WSNs). Herein, the swarm-intelligence-centric routing algorithm (SICROA) is presented for use in WSNs that aim to leverage the advantages of the ant colony optimization (ACO) algorithm. The proposed routing protocol addresses the problems of the ad hoc on-demand distance vector (AODV) and improves routing performance via collision avoidance, link-quality prediction, and maintenance methods. The proposed method was found to improve network performance by replacing the periodic “Hello” message with an interrupt that facilitates the prediction and detection of link disconnections. Consequently, the overall network performance can be further improved by prescribing appropriate procedures for processing each control message. Therefore, it is inferred that the proposed SI-based approach provides an optimal solution to problems encountered in a complex environment, while operating in a distributed manner and adhering to simple rules of behavior.


Sign in / Sign up

Export Citation Format

Share Document