scispace - formally typeset
Search or ask a question

Showing papers by "Robin Doss published in 2009"


Proceedings ArticleDOI
20 Dec 2009
TL;DR: This paper proposes a novel reclustering algorithm that uses 2-hop neighbourhood information for node recovery and proposes the modified Deluge protocol for node reprogramming, which is both decentralized and scalable.
Abstract: Wireless Sensor Networks (WSNs) are susceptible to a wide range of security attacks in hostile environments due to the limited processing and energy capabilities of sensor nodes. Consequently, the use of WSNs in mission critical applications requires reliable detection and fast recovery from these attacks. While much research has been devoted to detecting security attacks, very little attention has been paid yet to the recovery task. In this paper, we present a novel mechanism that is based on dynamic network reclustering and node reprogramming for recovering from node compromise. In response to node compromise, the proposed recovery approach reclusters the network excluding compromised nodes; thus allowing normal network operation while initiating node recovery procedures. We propose a novel reclustering algorithm that uses 2-hop neighbourhood information for this purpose. For node reprogramming we propose the modified Deluge protocol. The proposed node recovery mechanism is both decentralized and scalable. Moreover, we demonstrate through its implementation on a TelosB-based sensor network testbed that the proposed recovery method performs well in a low-resource WSN.

10 citations


Proceedings ArticleDOI
14 Dec 2009
TL;DR: This paper proposes a novel, lightweight authentication protocol that can secure network and node recovery operations such as re-clustering and reprogramming, based on hash functions and compares the performance of two well-known lightweight hash functions, SHA-1 and Rabin.
Abstract: Wireless sensor networks (WSNs) suffer from a wide range of security attacks due to their limited processing and energy capabilities. Their use in numerous mission critical applications, however, requires that fast recovery from such attacks be achieved. Much research has been completed on detection of security attacks, while very little attention has been paid to recovery from an attack. In this paper, we propose a novel, lightweight authentication protocol that can secure network and node recovery operations such as re-clustering and reprogramming. Our protocol is based on hash functions and we compare the performance of two well-known lightweight hash functions, SHA-1 and Rabin. We demonstrate that our authentication protocol can be implemented efficiently on a sensor network test-bed with TelosB motes. Further, our experimental results show that our protocol is efficient both in terms of computational overhead and execution times which makes it suitable for low resourced sensor devices.

10 citations


Journal ArticleDOI
Robin Doss1, Gang Li1, Vicky Mak1, Shui Yu1, Morshed U. Chowdhury1 
TL;DR: Simulation and Analytical results prove the proposed method(s) of information discovery offer significant QoS benefits for ALL-type and ANY-type queries in comparison to previous approaches, as well as improving energy-efficiency and query resolution time.

9 citations


Book ChapterDOI
Gang Li1, Robin Doss1
01 Jan 2009
TL;DR: A set of important medium access control (MAC) attributes and possible design trade-offs in protocol design, with an emphasis on energy efficiency is discussed in this paper, where the authors categorize existing MAC protocols into five groups, outline the representative protocols, and compare their advantages and disadvantages in the context of wireless sensor network.
Abstract: Medium access control for wireless sensor networks has been an active research area in the past decade This chapter discusses a set of important medium access control (MAC) attributes and possible design trade-offs in protocol design, with an emphasis on energy efficiency Then we categorize existing MAC protocols into five groups, outline the representative protocols, and compare their advantages and disadvantages in the context of wireless sensor network Finally, thoughts for practitioners are presented and open research issues are also discussed

6 citations


Book ChapterDOI
01 Jan 2009
TL;DR: This chapter introduces the basic concepts required to understand cooperative relaying and reviews current state of the art energy-efficient routing protocols that realize cooperative relays.
Abstract: Cooperative relaying has been shown to be an effective method to significantly improve the error-rate performance in wireless networks. This technique combats fading by exploiting the spatial diversity made available through cooperating nodes that relay signals for each other. In the context of wireless sensor networks, cooperative relaying can be applied to reduce the energy consumption in sensor nodes and thus extend the network lifetime. Realizing this benefit, however, requires a careful incorporation of this technique into the routing process to exploit diversity gains. In this chapter, we introduce the basic concepts required to understand cooperative relaying and review current state of the art energy-efficient routing protocols that realize cooperative relaying.

1 citations