scholarly journals Efficient and Secure Top-k Query Processing on Hybrid Sensed Data

2016 ◽  
Vol 2016 ◽  
pp. 1-10 ◽  
Author(s):  
Haiqin Wu ◽  
Liangmin Wang

The ubiquity of mobile devices equipped with various sensors has promoted the advent of a novel data sensing paradigm. Based on the traditional static sensing mode, the mobile sensing (sensor) nodes collaboratively collect data with the static sensor nodes. This large volume of hybrid sensed data is then sent to the storage nodes for flexible management and top-k query services. One crucial security issue is that the compromised storage node may falsify or drop some data during the query processing, which returns fake or incorrect result to the query users. In this paper, we propose an efficient and verifiable scheme (EVTopk) for secure top-k query processing on hybrid sensed data, which is suitable for the tiered hybrid sensing network where mobile nodes exist. The basic idea is to bind each data record, generated by static or mobile sensing nodes, with the corresponding location where it is sensed. Then some verification information is created sequentially, which is submitted along with the encrypted locations and hybrid sensed data for user’s verification. The security and efficiency of EVTopk are thoroughly analyzed in theory and evaluated in our experiments, respectively.

Author(s):  
Hoang Dang Hai ◽  
Thorsten Strufe ◽  
Pham Thieu Nga ◽  
Hoang Hong Ngoc ◽  
Nguyen Anh Son ◽  
...  

Sparse  Wireless  Sensor  Networks  using several  mobile  nodes  and  a  small  number  of  static sensor  nodes  have  been  widely  used  for  many applications,  especially  for  traffic-generated  pollution monitoring.  This  paper  proposes  a  method  for  data collection and forwarding using Mobile Elements (MEs), which are moving on predefined trajectories in contrast to previous works that use a mixture of MEsand static nodes. In our method, MEscan be used as data collector as well as dynamic bridges for data transfer. We design the  trajectories  in  such  a  way,  that  they  completely cover  the  deployed  area  and  data  will  be  gradually forwarded  from  outermost  trajectories  to  the  center whenever  a  pair  of MEs contacts  each  other  on  an overlapping road distance of respective trajectories. The method  is based  on  direction-oriented  level  and  weight assignment.  We  analyze  the  contact  opportunity  for data  exchange  while MEs move.  The  method  has  been successfully tested for traffic pollution monitoring in an urban area.


Sensor Review ◽  
2018 ◽  
Vol 38 (4) ◽  
pp. 534-541
Author(s):  
Sangeetha M. ◽  
Sabari A.

Purpose This paper aims to provide prolonging network lifetime and optimizing energy consumption in mobile wireless sensor networks (MWSNs). Forming clusters of mobile nodes is a great task owing to their dynamic nature. Such clustering has to be performed with a higher consumption of energy. Perhaps sensor nodes might be supplied with batteries that cannot be recharged or replaced while in the field of operation. One optimistic approach to handle the issue of energy consumption is an efficient way of cluster organization using the particle swarm optimization (PSO) technique. Design/methodology/approach In this paper two improved versions of centralized PSO, namely, unequal clustering PSO (UC-PSO) and hybrid K-means clustering PSO (KC-PSO), are proposed, with a focus of achieving various aspects of clustering parameters such as energy consumption, network lifetime and packet delivery ratio to achieve energy-efficient and reliable communication in MWSNs. Findings Theoretical analysis and simulation results show that improved PSO algorithms provide a balanced energy consumption among the cluster heads and increase the network lifetime effectively. Research limitations/implications In this work, each sensor node transmits and receives packets at same energy level only. In this work, focus was on centralized clustering only. Practical implications To validate the proposed swarm optimization algorithm, a simulation-based performance analysis has been carried out using NS-2. In each scenario, a given number of sensors are randomly deployed and performed in a monitored area. In this work, simulations were carried out in a 100 × 100 m2 network consisting 200 nodes by using a network simulator under various parameters. The coordinate of base station is assumed to be 50 × 175. The energy consumption due to communication is calculated using the first-order radio model. It is considered that all nodes have batteries with initial energy of 2 J, and the sensing range is fixed at 20 m. The transmission range of each node is up to 25 m and node mobility is set to 10 m/s. Practical implications This proposed work utilizes the swarm behaviors and targets the improvement of mobile nodes’ lifetime and energy consumption. Originality/value PSO algorithms have been implemented for dynamic sensor nodes, which optimize the clustering and CH selection in MWSNs. A new fitness function is evaluated to improve the network lifetime, energy consumption, cluster formation, packet transmissions and cluster head selection.


Author(s):  
Mumtaz Qabulio ◽  
Yasir Arfat Malkani ◽  
Muhammad S. Memon ◽  
Ayaz Keerio

Wireless sensor networks (WSNs) are comprised of large collections of small devices having low operating power, low memory space, and limited processing capabilities referred to as sensor nodes. The nodes in WSNs are capable of sensing, recording, and monitoring environmental conditions. Nowadays, a variety of WSNs applications can be found in many areas such as in healthcare, agriculture, industries, military, homes, offices, hospitals, smart transportation, and smart buildings. Though WSNs offer many useful applications, they suffer from many deployment issues. The security issue is one of them. The security of WSNs is considerable because of the use of unguided medium and their deployment in harsh, physically unprotected, and unattended environments. This chapter aims to discuss various security objectives and security attacks on WSNs and summarizes the discussed attacks according to their categories. The chapter also discusses different security protocols presented to prevent, detect, and recover the WSNs from various security attacks.


Author(s):  
Nandoori Srikanth ◽  
Muktyala Sivaganga Prasad

<p>Wireless Sensor Networks (WSNs) can extant the individual profits and suppleness with regard to low-power and economical quick deployment for numerous applications. WSNs are widely utilized in medical health care, environmental monitoring, emergencies and remote control areas. Introducing of mobile nodes in clusters is a traditional approach, to assemble the data from sensor nodes and forward to the Base station. Energy efficiency and lifetime improvements are key research areas from past few decades. In this research, to solve the energy limitation to upsurge the network lifetime, Energy efficient trust node based routing protocol is proposed. An experimental validation of framework is focused on Packet Delivery Ratio, network lifetime, throughput, energy consumption and network loss among all other challenges. This protocol assigns some high energy nodes as trusted nodes, and it decides the mobility of data collector.  The energy of mobile nodes, and sensor nodes can save up to a great extent by collecting data from trusted nodes based on their trustworthiness and energy efficiency.  The simulation outcome of our evaluation shows an improvement in all these parameters than existing clustering and Routing algorithms.<strong></strong></p>


2012 ◽  
Vol 39 (9) ◽  
pp. 1083-1088 ◽  
Author(s):  
Xuesong Shen ◽  
Ming Lu

The state-of-the-art tracking technologies, such as the global positioning system (GPS) and the radio frequency identification (RFID), lend themselves well to applications in relatively open areas, while falling short of accuracy and reliability in indoor or partially covered application settings due to signal blockage, distortion or deterioration. This research aims to address this challenge in construction engineering by exploring a cost-effective positioning methodology to realize automated and continuous tracking of construction resources. The emerging ZigBee-based wireless sensor networks (WSN) technology is introduced. A framework of WSN application is proposed for indoor construction resources tracking, which consists of a group of stationary and mobile sensor nodes that can communicate with one another. Real-time locations of the mobile nodes can be determined by applying the localization method based on received signal strength indicator (RSSI) and geometric trilateration.


2015 ◽  
Vol 738-739 ◽  
pp. 1119-1122
Author(s):  
Xia Ling Zeng

For sparse overlay network built by static sensor nodes, this paper proposes the introduction of heterogeneous mobile sensor nodes, and designs a mobile coverage strategy to optimize the coverage performance of sensor network. At first, the monitoring area is divided into several sub-regions by iterative quartering and the sub-regions are represented by a quad-tree structure. Secondly, the mobile coverage strategy is planned based on the idea of divide and conquers and combing the overall regional strategy with local regional strategy. The overall regional mobile strategy is planned by go through all sub-regions according to breadth-first traversal of the quad-tree. The local regional mobile strategy in each sub-region is designed based on the distribution of static nodes after the sub-region meshing. The results show that the mobile coverage strategy can achieve good network coverage, and it is very suitable for multiple mobile nodes.


2015 ◽  
Vol 713-715 ◽  
pp. 1137-1140
Author(s):  
Xia Ling Zeng

For multilayer mobile sensor network, the issues of improving sensor network coverage by the use of mobile sensors are studied. A coverage-optimized deployment algorithm based on grid-division and bipartite graph matching is proposed. Firstly, the deployment area is divided into many grids and build distribution matrix of sensor nodes. Then construct a bipartite graph G based on the grid-division and solve a matching of maximum cardinality of G. It corresponds to an optimal deployment scheme which maximizes the network coverage and minimizes the total movement cost. Results show that after optimized deployment the network coverage increases, and with the increase in the percentage of mobile nodes it increases accordingly. In the way of distributed calculating the network also can achieve a higher coverage ratio and the movement cost is lower. It is very suitable for deployment of multilayer sensor network.


Author(s):  
Mustafa Mahmood Akawee ◽  
Mohanad Ali Meteab Al-Obaidi ◽  
Haider Mohammed Turki Al-Hilfi ◽  
Sabbar Insaif Jassim ◽  
Tole Sutikno

<span>Wireless Sensor Network (WSN) is one of the most important elements of the Internet of Things paradigm. Energy consumption is a vital issue in IoT and WSN.  Security primitives in the IoT are energy consuming. Addressed the security issue for transmitted data by IoT sensor node add another challenge in term of energy consumption. finding the satisfactory solutions that reduce power consumption at the same time as making sure the required security services is not always an easy undertaking. Therefore, in this article, we proposed an efficient hybrid model for secure transmission of data from sensor nodes to receivers in WSN applications.  The proposed model includes two algorithms Rivest–Shamir–Adleman (RSA) and efficient data collection and dissemination (EDCD). The key idea behind the proposed model is to prevent to secure sensed data if no significant change between the current data and the last transmitted data by the apply EDCD1 algorithm, which that will help in saving the sensor node energy. The reason for that the size of cipher data is so large compared to the sensed data, which that will increase the energy consumption.  The outcome results shown that the proposed model has a high performance compared to RSA in term of energy consumption.</span>


Sign in / Sign up

Export Citation Format

Share Document