scispace - formally typeset
Search or ask a question

Showing papers on "Key distribution in wireless sensor networks published in 2008"


Journal ArticleDOI
TL;DR: This survey presents a comprehensive review of the recent literature since the publication of a survey on sensor networks, and gives an overview of several new applications and then reviews the literature on various aspects of WSNs.

5,626 citations


Journal ArticleDOI
01 Jun 2008
TL;DR: This paper reports on the current state of the research on optimized node placement in WSNs, and categorizes the placement strategies into static and dynamic depending on whether the optimization is performed at the time of deployment or while the network is operational, respectively.
Abstract: The major challenge in designing wireless sensor networks (WSNs) is the support of the functional, such as data latency, and the non-functional, such as data integrity, requirements while coping with the computation, energy and communication constraints. Careful node placement can be a very effective optimization means for achieving the desired design goals. In this paper, we report on the current state of the research on optimized node placement in WSNs. We highlight the issues, identify the various objectives and enumerate the different models and formulations. We categorize the placement strategies into static and dynamic depending on whether the optimization is performed at the time of deployment or while the network is operational, respectively. We further classify the published techniques based on the role that the node plays in the network and the primary performance objective considered. The paper also highlights open problems in this area of research.

924 citations


Journal ArticleDOI
TL;DR: This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.
Abstract: With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make-up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad-hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd.

879 citations


Journal ArticleDOI
TL;DR: A Bayesian formulation, specifically a beta reputation system, is employed for the algorithm steps of reputation representation, updates, integration and trust evolution in sensor networks to allow the sensor nodes to develop a community of trust.
Abstract: Sensor network technology promises a vast increase in automatic data collection capabilities through efficient deployment of tiny sensing devices. The technology will allow users to measure phenomena of interest at unprecedented spatial and temporal densities. However, as with almost every data-driven technology, the many benefits come with a significant challenge in data reliability. If wireless sensor networks are really going to provide data for the scientific community, citizen-driven activism, or organizations which test that companies are upholding environmental laws, then an important question arises: How can a user trust the accuracy of information provided by the sensor networkq Data integrity is vulnerable to both node and system failures. In data collection systems, faults are indicators that sensor nodes are not providing useful information. In data fusion systems the consequences are more dire; the final outcome is easily affected by corrupted sensor measurements, and the problems are no longer visibly obvious.In this article, we investigate a generalized and unified approach for providing information about the data accuracy in sensor networks. Our approach is to allow the sensor nodes to develop a community of trust. We propose a framework where each sensor node maintains reputation metrics which both represent past behavior of other nodes and are used as an inherent aspect in predicting their future behavior. We employ a Bayesian formulation, specifically a beta reputation system, for the algorithm steps of reputation representation, updates, integration and trust evolution. This framework is available as a middleware service on motes and has been ported to two sensor network operating systems, TinyOS and SOS. We evaluate the efficacy of this framework using multiple contexts: (1) a lab-scale test bed of Mica2 motes, (2) Avrora simulations, and (3) real data sets collected from sensor network deployments in James Reserve.

869 citations


Proceedings ArticleDOI
27 Jun 2008
TL;DR: MQTT-S is designed in such a way that it can be run on low-end and battery-operated sensor/actuator devices and operate over bandwidth-constraint WSNs such as ZigBee-based networks.
Abstract: Wireless sensor networks (WSNs) pose novel challenges compared with traditional networks. To answer such challenges a new communication paradigm, data-centric communication, is emerging. One form of data-centric communication is the publish/subscribe messaging system. Compared with other data-centric variants, publish/subscribe systems are common and wide-spread in distributed computing. Thus, extending publish/subscribe systems intoWSNs will simplify the integration of sensor applications with other distributed applications. This paper describes MQTT-S [1], an extension of the open publish/subscribe protocol message queuing telemetry transport (MQTT) [2] to WSNs. MQTT-S is designed in such a way that it can be run on low-end and battery-operated sensor/actuator devices and operate over bandwidth-constraint WSNs such as ZigBee-based networks. Various protocol design points are discussed and compared. MQTT-S has been implemented and is currently being tested on the IBM wireless sensor networking testbed [3]. Implementation aspects, open challenges and future work are also presented.

743 citations


Book ChapterDOI
05 May 2008
TL;DR: A depth-based routing (DBR) protocol that can take advantage of a multiple-sink underwater sensor network architecture without introducing extra cost and can achieve very high packet delivery ratios for dense networks with only small communication cost is proposed.
Abstract: Providing scalable and efficient routing services in underwater sensor networks (UWSNs) is very challenging due to the unique characteristics of UWSNs. Firstly, UWSNs often employ acoustic channels for communications because radio signals do not work well in water. Compared with radio-frequency channels, acoustic channels feature much lower bandwidths and several orders of magnitudes longer propagation delays. Secondly, UWSNs usually have very dynamic topology as sensors move passively with water currents. Some routing protocols have been proposed to address the challenging problem in UWSNs. However, most of them assume that the full-dimensional location information of all sensor nodes in a network is known in prior through a localization process, which is yet another challenging issue to be solved in UWSNs. In this paper, we propose a depth-based routing (DBR) protocol. DBR does not require full-dimensional location information of sensor nodes. Instead, it needs only local depth information, which can be easily obtained with an inexpensive depth sensor that can be equipped in every underwater sensor node. A key advantage of our protocol is that it can handle network dynamics efficiently without the assistance of a localization service. Moreover, our routing protocol can take advantage of a multiple-sink underwater sensor network architecture without introducing extra cost. We conduct extensive simulations. The results show that DBR can achieve very high packet delivery ratios (at least 95%) for dense networks with only small communication cost.

652 citations


Patent
17 Mar 2008
TL;DR: In this paper, a trusted system may be used to generate wireless configuration parameters for a wireless network based on identity information, which is stored on the trusted system remote to the wireless network and accessible to the user.
Abstract: Techniques are provided for the relating identity information with wireless configuration information for a wireless device or a wireless network A trusted system may be used to generate wireless configuration parameters for a wireless network based on identity information The identity-based wireless configuration information may be stored on the trusted system remote to the wireless network and accessible to the wireless device The wireless configuration may be migrated from the trusted system to the wireless device

523 citations


Journal ArticleDOI
TL;DR: Several state-of-the-art algorithms and techniques are presented and compared that aim to address the coverage-connectivity issue in wireless sensor networks.

508 citations


Proceedings ArticleDOI
22 Apr 2008
TL;DR: This paper introduces CHEF - cluster head election mechanism using fuzzy logic, and proves efficiency of CHEF compared with LEACH using the matlab, showing that CHEF is about 22.7% more efficient than LEACH.
Abstract: In designing the wireless sensor networks, the energy is the most important consideration because the lifetime of the sensor node is limited by the battery of it. To overcome this demerit many research have been done. The clustering is the one of the representative approaches. In the clustering, the cluster heads gather data from nodes, aggregate it and send the information to the base station. In this way, the sensor nodes can reduce communication overheads that may be generated if each sensor node reports sensed data to the base station independently. LEACH is one of the most famous clustering mechanisms. It elects a cluster head based on probability model. This approach may reduce the network lifetime because LEACH does not consider the distribution of sensor nodes and the energy remains of each node. However, using the location and the energy information in the clustering can generate big overheads. In this paper we introduce CHEF - cluster head election mechanism using fuzzy logic. By using fuzzy logic, collecting and calculating overheads can be reduced and finally the lifetime of the sensor networks can be prolonged. To prove efficiency of CHEF, we simulated CHEF compared with LEACH using the matlab. Our simulation results show that CHEF is about 22.7% more efficient than LEACH.

480 citations


Journal ArticleDOI
TL;DR: This paper addresses the following relay sensor placement problem: given the set of duty sensors in the plane and the upper bound of the transmission range, compute the minimum number of relay sensors such that the induced topology by all sensors is globally connected.
Abstract: This paper addresses the following relay sensor placement problem: given the set of duty sensors in the plane and the upper bound of the transmission range, compute the minimum number of relay sensors such that the induced topology by all sensors is globally connected. This problem is motivated by practically considering the tradeoff among performance, lifetime, and cost when designing sensor networks. In our study, this problem is modelled by a NP-hard network optimization problem named Steiner Minimum Tree with Minimum number of Steiner Points and bounded edge length (SMT-MSP). In this paper, we propose two approximate algorithms, and conduct detailed performance analysis. The first algorithm has a performance ratio of 3 and the second has a performance ratio of 2.5.

476 citations


Journal ArticleDOI
TL;DR: A comprehensive survey of WSNSecurity issues that were investigated by researchers in recent years and that shed light on future directions for WSN security are presented.
Abstract: The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network. WSNs have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios. In hostile scenarios, it is very important to protect WSNs from malicious attacks. Due to various resource limitations and the salient features of a wireless sensor network, the security design for such networks is significantly challenging. In this article, we present a comprehensive survey of WSN security issues that were investigated by researchers in recent years and that shed light on future directions for WSN security.

Journal ArticleDOI
TL;DR: This survey focuses on the video encoding at the video sensors and the real-time transport of the encoded video to a base station, and considers the mechanisms operating at the application, transport, network, and MAC layers.
Abstract: A wireless sensor network with multimedia capabilities typically consists of data sensor nodes, which sense, for instance, sound or motion, and video sensor nodes, which capture video of events of interest. In this survey, we focus on the video encoding at the video sensors and the real-time transport of the encoded video to a base station. Real-time video streams have stringent requirements for end-to-end delay and loss during network transport. In this survey, we categorize the requirements of multimedia traffic at each layer of the network protocol stack and further classify the mechanisms that have been proposed for multimedia streaming in wireless sensor networks at each layer of the stack. Specifically, we consider the mechanisms operating at the application, transport, network, and MAC layers. We also review existing cross-layer approaches and propose a few possible cross-layer solutions to optimize the performance of a given wireless sensor network for multimedia streaming applications.

Journal ArticleDOI
TL;DR: A comprehensive review of recent developments in wireless sensor technology for monitoring behaviour related to human physiological responses is provided and background information on the use of wireless technology and sensors to develop a wireless physiological measurement system is presented.
Abstract: Current wireless technologies, such as wireless body area networks and wireless personal area networks, provide promising applications in medical monitoring systems to measure specified physiological data and also provide location-based information, if required. With the increasing sophistication of wearable and implantable medical devices and their integration with wireless sensors, an ever-expanding range of therapeutic and diagnostic applications is being pursued by research and commercial organizations. This paper aims to provide a comprehensive review of recent developments in wireless sensor technology for monitoring behaviour related to human physiological responses. It presents background information on the use of wireless technology and sensors to develop a wireless physiological measurement system. A generic miniature platform and other available technologies for wireless sensors have been studied in terms of hardware and software structural requirements for a low-cost, low-power, non-invasive and unobtrusive system.

Journal ArticleDOI
TL;DR: This paper demonstrates the advantages of using controlled mobility in wireless sensor networks (WSNs) for increasing their lifetime, i.e., the period of time the network is able to provide its intended functionalities.
Abstract: This paper demonstrates the advantages of using controlled mobility in wireless sensor networks (WSNs) for increasing their lifetime, i.e., the period of time the network is able to provide its intended functionalities. More specifically, for WSNs that comprise a large number of statically placed sensor nodes transmitting data to a collection point (the sink), we show that by controlling the sink movements we can obtain remarkable lifetime improvements. In order to determine sink movements, we first define a Mixed Integer Linear Programming (MILP) analytical model whose solution determines those sink routes that maximize network lifetime. Our contribution expands further by defining the first heuristics for controlled sink movements that are fully distributed and localized. Our Greedy Maximum Residual Energy (GMRE) heuristic moves the sink from its current location to a new site as if drawn toward the area where nodes have the highest residual energy. We also introduce a simple distributed mobility scheme (Random Movement or RM) according to which the sink moves uncontrolled and randomly throughout the network. The different mobility schemes are compared through extensive ns2-based simulations in networks with different nodes deployment, data routing protocols, and constraints on the sink movements. In all considered scenarios, we observe that moving the sink always increases network lifetime. In particular, our experiments show that controlling the mobility of the sink leads to remarkable improvements, which are as high as sixfold compared to having the sink statically (and optimally) placed, and as high as twofold compared to uncontrolled mobility.

Journal ArticleDOI
TL;DR: The state of the art in research on sensor network security is surveyed, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply.
Abstract: Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments. Security is critical for many sensor network applications, such as military target tracking and security monitoring. To provide security and privacy to small sensor nodes is challenging, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply. In this article we survey the state of the art in research on sensor network security.

Journal IssueDOI
01 Oct 2008
TL;DR: Recommendations are made for the selection of communication carriers for UWSNs with engineering countermeasures that can possibly enhance the communication efficiency in specified underwater environments.
Abstract: This paper reviews the physical fundamentals and engineering implementations for efficient information exchange via wireless communication using physical waves as the carrier among nodes in an underwater sensor network (UWSN). The physical waves under discussion include sound, radio, and light. We first present the fundamental physics of different waves; then we discuss and compare the pros and cons for adopting different communication carriers (acoustic, radio, and optical) based on the fundamental first principles of physics and engineering practice. The discussions are mainly targeted at underwater sensor networks (UWSNs) with densely deployed nodes. Based on the comparison study, we make recommendations for the selection of communication carriers for UWSNs with engineering countermeasures that can possibly enhance the communication efficiency in specified underwater environments. Copyright © 2008 John Wiley & Sons, Ltd.

Proceedings ArticleDOI
03 Mar 2008
TL;DR: MiXiM as mentioned in this paper joins and extends several existing simulation frameworks developed for wireless and mobile simulations in OMNeT++, providing detailed models of the wireless channel, wireless connectivity, mobility models, models for obstacles and many communication protocols especially at the medium access control (MAC) level.
Abstract: Wireless communication has attracted considerable interest in the research community, and many wireless networks are evaluated using discrete event simulators like OMNeT++. Although OMNeT++ provides a powerful and clear simulation framework, it lacks of direct support and a concise modeling chain for wireless communication. Both is provided by MiXiM. MiXiM joins and extends several existing simulation frameworks developed for wireless and mobile simulations in OMNeT++. It provides detailed models of the wireless channel (fading, etc.), wireless connectivity, mobility models, models for obstacles and many communication protocols especially at the Medium Access Control (MAC) level. Further, it provides a user-friendly graphical representation of wireless and mobile networks in OMNeT++, supporting debugging and defining even complex wireless scenarios. Though still in development, MiXiM already is a powerful tool for performance analysis of wireless networks. Its extensive functionality and clear concept may motivate researches to contribute to this open-source project [4].

Proceedings ArticleDOI
05 Nov 2008
TL;DR: This paper presents the design of a complete IPv6-based network architecture for wireless sensor networks and validate the architecture with a production-quality implementation that incorporates many techniques pioneered in the sensor network community, including duty-cycled link protocols, header compression, hop-by-hop forwarding, and efficient routing with effective link estimation.
Abstract: A decade ago as wireless sensor network research took off many researchers in the field denounced the use of IP as inadequate and in contradiction to the needs of wireless sensor networking. Since then the field has matured, standard links have emerged, and IP has evolved. In this paper, we present the design of a complete IPv6-based network architecture for wireless sensor networks. We validate the architecture with a production-quality implementation that incorporates many techniques pioneered in the sensor network community, including duty-cycled link protocols, header compression, hop-by-hop forwarding, and efficient routing with effective link estimation. In addition to providing interoperability with existing IP devices, this implementation was able to achieve an average duty-cycle of 0.65%, average per-hop latency of 62ms, and a data reception rate of 99.98% over a period of 4 weeks in a real-world home-monitoring application where each node generates one application packet per minute. Our results outperform existing systems that do not adhere to any particular standard or architecture. In light of this demonstration of full IPv6 capability, we review the central arguments that led the field away from IP. We believe that the presence of an architecture, specifically an IPv6-based one, provides a strong foundation for wireless sensor networks going forward.

Journal ArticleDOI
17 Oct 2008
TL;DR: Current research on prototypes of multimedia sensors and their integration into testbeds for experimental evaluation of algorithms and protocols for WMSNs are described and open research issues and future research directions are discussed.
Abstract: The availability of low-cost hardware is enabling the development of wireless multimedia sensor networks (WMSNs), i.e., networks of resource-constrained wireless devices that can retrieve multimedia content such as video and audio streams, still images, and scalar sensor data from the environment. In this paper, ongoing research on prototypes of multimedia sensors and their integration into testbeds for experimental evaluation of algorithms and protocols for WMSNs are described. Furthermore, open research issues and future research directions, both at the device level and at the testbed level, are discussed. This paper is intended to be a resource for researchers interested in advancing the state-of-the-art in experimental research on wireless multimedia sensor networks.

Journal ArticleDOI
TL;DR: This paper reviews the characteristics and energy requirements of typical sensor network nodes, assesses a range of potential ambient energy sources, and outlines the characteristics of a wide range of energy conversion devices, and proposed method to compare these diverse sources and conversion mechanisms in terms of their normalised power density.
Abstract: Wireless sensor networks (WSNs) offer an attractive solution to many environmental, security, and process monitoring problems. However, one barrier to their fuller adoption is the need to supply electrical power over extended periods of time without the need for dedicated wiring. Energy harvesting provides a potential solution to this problem in many applications. This paper reviews the characteristics and energy requirements of typical sensor network nodes, assesses a range of potential ambient energy sources, and outlines the characteristics of a wide range of energy conversion devices. It then proposes a method to compare these diverse sources and conversion mechanisms in terms of their normalised power density.

Book ChapterDOI
30 Jan 2008
TL;DR: Results show that the system's lifetime can be significantly extended while keeping high recognition accuracies, and how this approach can be implemented in a dynamic sensor network by using the context-recognition framework Titan that is developing for dynamic and heterogeneous sensor networks.
Abstract: Activity recognition from an on-body sensor network enables context-aware applications in wearable computing. A guaranteed classification accuracy is desirable while optimizing power consumption to ensure the system's wearability. In this paper, we investigate the benefits of dynamic sensor selection in order to use efficiently available energy while achieving a desired activity recognition accuracy. For this purpose we introduce and characterize an activity recognition method with an underlying run-time sensor selection scheme. The system relies on a meta-classifier that fuses the information of classifiers operating on individual sensors. Sensors are selected according to their contribution to classification accuracy as assessed during system training. We test this system by recognizing manipulative activities of assembly-line workers in a car production environment. Results show that the system's lifetime can be significantly extended while keeping high recognition accuracies. We discuss how this approach can be implemented in a dynamic sensor network by using the context-recognition framework Titan that we are developing for dynamic and heterogeneous sensor networks.

Journal ArticleDOI
TL;DR: A novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications, which leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee.
Abstract: This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process.

DatasetDOI
TL;DR: The rapid progress of wireless communication, embedded micro-electro-mechanical systems (MEMS), and integrated circuits (ICs) in mobile devices and embedded systems is being studied.
Abstract: The rapid progress of wireless communication, embedded micro-electro-mechanical systems (MEMS), and …

Proceedings ArticleDOI
26 May 2008
TL;DR: This work proposes a rendezvous-based data collection approach in which a subset of nodes serve as the rendezvous points that buffer and aggregate data originated from sources and transfer to the base station when it arrives.
Abstract: Recent research shows that significant energy saving can be achieved in wireless sensor networks with a mobile base station that collects data from sensor nodes via short-range communications. However, a major performance bottleneck of such WSNs is the significantly increased latency in data collection due to the low movement speed of mobile base stations. To address this issue, we propose a rendezvous-based data collection approach in which a subset of nodes serve as the rendezvous points that buffer and aggregate data originated from sources and transfer to the base station when it arrives. This approach combines the advantages of controlled mobility and in-network data caching and can achieve a desirable balance between network energy saving and data collection delay. We propose two efficient rendezvous design algorithms with provable performance bounds for mobile base stations with variable and fixed tracks, respectively. The effectiveness of our approach is validated through both theoretical analysis and extensive simulations.

Proceedings ArticleDOI
12 Oct 2008
TL;DR: This paper investigates the energy cost of cryptographic protocols, both from a communication and a computation point of view, based on practical measurements on the MICAz and TelosB sensors and finds that Kerberos is around one order of magnitude less costly than the ECDH-ECDSA key exchange.
Abstract: Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of cryptographic protocols, both from a communication and a computation point of view, based on practical measurements on the MICAz and TelosB sensors. We focus on the cost of two key agreement protocols: Kerberos and the elliptic curve Diffie-Hellman key exchange with authentication provided by the elliptic curve digital signature algorithm (ECDH-ECDSA). We find that, in our context, Kerberos is around one order of magnitude less costly than the ECDH-ECDSA key exchange and confirm that it should be preferred in situations where a trusted third party is available. We also observe that the power dedicated to communications can become a central concern when the nodes need to stay in listen mode, e.g. between the protocol rounds, even when reduced using a low power listening (LPL) protocol. Therefore, listening should be considered when assessing the cost of cryptographic protocols on sensor nodes.

Proceedings ArticleDOI
05 Nov 2008
TL;DR: A web service based approach to enable an evolutionary sensornet system where additional sensor nodes may be added after the initial deployment, identifying design choices that optimize the web service operation on resource constrained sensor nodes, including support for low latency messaging and sleep modes.
Abstract: We present a web service based approach to enable an evolutionary sensornet system where additional sensor nodes may be added after the initial deployment. The functionality and data provided by the new nodes is exposed in a structured manner, so that multiple applications may access them. The result is a highly inter-operable system where multiple applications can share a common evolving sensor substrate. A key challenge in using web services on resource constrained sensor nodes is the energy and bandwidth overhead of the structured data formats used in web services. Our work provides a detailed evaluation of the overheads and presents an implementation on a representative sensor platform with 48k of ROM, 10k of RAM and a 802.15.4 radio. We identify design choices that optimize the web service operation on resource constrained sensor nodes, including support for low latency messaging and sleep modes, quantifying trade-offs between the design generality and resource efficiency. We also prototyped an example application, for home energy management, demonstrating how evolutionary sensor networks can be supported with our approach.

Journal ArticleDOI
01 Jul 2008
TL;DR: A range-free anchor-based localization algorithm for mobile wireless sensor networks that builds upon the Monte Carlo localization algorithm is proposed that focuses on improving the localization accuracy and efficiency by making better use of the information a sensor node gathers and by drawing the necessary location samples faster.
Abstract: Localization is crucial to many applications in wireless sensor networks. In this article, we propose a range-free anchor-based localization algorithm for mobile wireless sensor networks that builds upon the Monte Carlo localization algorithm. We concentrate on improving the localization accuracy and efficiency by making better use of the information a sensor node gathers and by drawing the necessary location samples faster. To do so, we constrain the area from which samples are drawn by building a box that covers the region where anchors' radio ranges overlap. This box is the region of the deployment area where the sensor node is localized. Simulation results show that localization accuracy is improved by a minimum of 4% and by a maximum of 73% (average 30%), for varying node speeds when considering nodes with knowledge of at least three anchors. The coverage is also strongly affected by speed and its improvement ranges from 3% to 55% (average 22%). Finally, the processing time is reduced by 93% for a similar localization accuracy.

Book ChapterDOI
30 Jan 2008
TL;DR: This paper presents results on implementing ECC, as well as the related emerging field of Pairing-Based Cryptography (PBC), on two of the most popular sensor nodes, and shows that PKC is not only viable, but in fact attractive for WSNs.
Abstract: By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-Key Cryptography (PKC) is indeed feasible on resource-constrained nodes This feasibility, however, does not necessarily mean attractiveness, as the obtained results are still not satisfactory enough In this paper, we present results on implementing ECC, as well as the related emerging field of Pairing-Based Cryptography (PBC), on two of the most popular sensor nodes By doing that, we show that PKC is not only viable, but in fact attractive for WSNs As far as we know pairing computations presented in this paper are the most efficient results on the MICA2 (8-bit/73828-MHz ATmega128L) and Tmote Sky (16-bit/8192-MHz MSP-430) nodes

Journal ArticleDOI
TL;DR: The results showed that the WSN provides spatially dense and accurate ambient vibration data for identifying vibration modes of a bridge and the scalability of the network and the data quality was demonstrated.
Abstract: An integrated hardware and software system for a scalable wireless sensor network WSN is designed and developed for structural health monitoring. An accelerometer sensor node is designed, developed, and calibrated to meet the requirements for structural vibration monitoring and modal identification. The nodes have four channels of accelerometers in two directions and a microcontroller for processing and wireless communication in a multihop network. Software components have been implemented within the TinyOS oper- ating system to provide a flexible software platform and scalable performance for structural health monitoring applications. These components include a protocol for reliable command dissemination through the network and data collection, and improvements to software components for data pipelining, jitter control, and high-frequency sampling. The prototype WSN was deployed on a long-span bridge with 64 nodes. The data acquired from the testbed were used to examine the scalability of the network and the data quality. Robust and scalable performance was demonstrated even with a large number of hops required for communication. The results showed that the WSN provides spatially dense and accurate ambient vibration data for identifying vibration modes of a bridge.