scispace - formally typeset
Search or ask a question

Showing papers on "Key distribution in wireless sensor networks published in 2015"


Journal ArticleDOI
TL;DR: This paper presents an overview of the RF-EHNs including system architecture, RF energy harvesting techniques, and existing applications, and explores various key design issues according to the network types, i.e., single-hop networks, multiantenna networks, relay networks, and cognitive radio networks.
Abstract: Radio frequency (RF) energy transfer and harvesting techniques have recently become alternative methods to power the next-generation wireless networks As this emerging technology enables proactive energy replenishment of wireless devices, it is advantageous in supporting applications with quality-of-service requirements In this paper, we present a comprehensive literature review on the research progresses in wireless networks with RF energy harvesting capability, which is referred to as RF energy harvesting networks (RF-EHNs) First, we present an overview of the RF-EHNs including system architecture, RF energy harvesting techniques, and existing applications Then, we present the background in circuit design as well as the state-of-the-art circuitry implementations and review the communication protocols specially designed for RF-EHNs We also explore various key design issues in the development of RF-EHNs according to the network types, ie, single-hop networks, multiantenna networks, relay networks, and cognitive radio networks Finally, we envision some open research directions

2,352 citations


Journal ArticleDOI
TL;DR: An overview of state-of- the-art RF-enabled WET technologies and their applications to wireless communications, highlighting the key design challenges, solutions, and opportunities ahead.
Abstract: The performance of wireless communication is fundamentally constrained by the limited battery life of wireless devices, the operations of which are frequently disrupted due to the need of manual battery replacement/recharging. The recent advance in RF-enabled wireless energy transfer (WET) technology provides an attractive solution named wireless powered communication (WPC), where the wireless devices are powered by dedicated wireless power transmitters to provide continuous and stable microwave energy over the air. As a key enabling technology for truly perpetual communications, WPC opens up the potential to build a network with larger throughput, higher robustness, and increased flexibility compared to its battery-powered counterpart. However, the combination of wireless energy and information transmissions also raises many new research problems and implementation issues that need to be addressed. In this article, we provide an overview of stateof- the-art RF-enabled WET technologies and their applications to wireless communications, highlighting the key design challenges, solutions, and opportunities ahead.

1,032 citations


Journal ArticleDOI
TL;DR: A smart hospital system (SHS), which relies on different, yet complementary, technologies, specifically RFID, WSN, and smart mobile, interoperating with each other through a Constrained Application Protocol (CoAP)/IPv6 over low-power wireless personal area network (6LoWPAN) network infrastructure.
Abstract: Over the last few years, the convincing forward steps in the development of Internet of Things (IoT)-enabling solutions are spurring the advent of novel and fascinating applications. Among others, mainly radio frequency identification (RFID), wireless sensor network (WSN), and smart mobile technologies are leading this evolutionary trend. In the wake of this tendency, this paper proposes a novel, IoT-aware, smart architecture for automatic monitoring and tracking of patients, personnel, and biomedical devices within hospitals and nursing institutes. Staying true to the IoT vision, we propose a smart hospital system (SHS), which relies on different, yet complementary, technologies, specifically RFID, WSN, and smart mobile, interoperating with each other through a Constrained Application Protocol (CoAP)/IPv6 over low-power wireless personal area network (6LoWPAN)/representational state transfer (REST) network infrastructure. The SHS is able to collect, in real time, both environmental conditions and patients’ physiological parameters via an ultra-low-power hybrid sensing network (HSN) composed of 6LoWPAN nodes integrating UHF RFID functionalities. Sensed data are delivered to a control center where an advanced monitoring application (MA) makes them easily accessible by both local and remote users via a REST web service. The simple proof of concept implemented to validate the proposed SHS has highlighted a number of key capabilities and aspects of novelty, which represent a significant step forward compared to the actual state of the art.

913 citations


Journal ArticleDOI
TL;DR: In this article, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer.
Abstract: This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.

632 citations


Journal ArticleDOI
TL;DR: This first comprehensive tutorial on the use of matching theory, a Nobel Prize winning framework, for resource management in wireless networks is developed and results show how matching theory can effectively improve the performance of resource allocation in all three applications discussed.
Abstract: The emergence of novel wireless networking paradigms such as small cell and cognitive radio networks has forever transformed the way in which wireless systems are operated. In particular, the need for self-organizing solutions to manage the scarce spectral resources has become a prevalent theme in many emerging wireless systems. In this article, the first comprehensive tutorial on the use of matching theory, a Nobel Prize winning framework, for resource management in wireless networks is developed. To cater for the unique features of emerging wireless networks, a novel, wireless-oriented classification of matching theory is proposed. Then the key solution concepts and algorithmic implementations of this framework are exposed. The developed concepts are applied in three important wireless networking areas in order to demonstrate the usefulness of this analytical tool. Results show how matching theory can effectively improve the performance of resource allocation in all three applications discussed.

515 citations


Journal ArticleDOI
TL;DR: This article focuses on the application of advanced smart antenna technologies to SWIPT, including multiple-input multiple-output and relaying techniques, which have the potential to significantly improve the energy efficiency and also the spectral efficiency ofSWIPT.
Abstract: Simultaneous wireless information and power transfer (SWIPT) is a promising solution to increase the lifetime of wireless nodes and hence alleviate the energy bottleneck of energy constrained wireless networks. As an alternative to conventional energy harvesting techniques, SWIPT relies on the use of radio frequency signals, and is expected to bring some fundamental changes to the design of wireless communication networks. This article focuses on the application of advanced smart antenna technologies to SWIPT, including multiple-input multiple-output and relaying techniques. These smart antenna technologies have the potential to significantly improve the energy efficiency and also the spectral efficiency of SWIPT. Different network topologies with single and multiple users are investigated, along with some promising solutions to achieve a favorable trade-off between system performance and complexity. A detailed discussion of future research challenges for the design of SWIPT systems is also provided.

438 citations


Journal ArticleDOI
TL;DR: Practical engineering solutions are focused on which sensor devices are used and what they are used for; and the identification of sensor configurations and network topologies, which identifies their respective motivations and distinguishes their advantages and disadvantages in a comparative review.
Abstract: In recent years, the range of sensing technologies has expanded rapidly, whereas sensor devices have become cheaper. This has led to a rapid expansion in condition monitoring of systems, structures, vehicles, and machinery using sensors. Key factors are the recent advances in networking technologies such as wireless communication and mobile ad hoc networking coupled with the technology to integrate devices. Wireless sensor networks (WSNs) can be used for monitoring the railway infrastructure such as bridges, rail tracks, track beds, and track equipment along with vehicle health monitoring such as chassis, bogies, wheels, and wagons. Condition monitoring reduces human inspection requirements through automated monitoring, reduces maintenance through detecting faults before they escalate, and improves safety and reliability. This is vital for the development, upgrading, and expansion of railway networks. This paper surveys these wireless sensors network technology for monitoring in the railway industry for analyzing systems, structures, vehicles, and machinery. This paper focuses on practical engineering solutions, principally, which sensor devices are used and what they are used for; and the identification of sensor configurations and network topologies. It identifies their respective motivations and distinguishes their advantages and disadvantages in a comparative review.

392 citations


Proceedings ArticleDOI
24 Aug 2015
TL;DR: SDN-WISE is stateful and pursues two objectives: to reduce the amount of information exchanged between sensor nodes and the SDN network controller, and to make sensor nodes programmable as finite state machines so enabling them to run operations that cannot be supported by stateless solutions.
Abstract: In this paper SDN-WISE, a Software Defined Networking (SDN) solution for WIreless SEnsor networks, is introduced. Differently from the existing SDN solutions for wireless sensor networks, SDN-WISE is stateful and pursues two objectives: (i) to reduce the amount of information exchanged between sensor nodes and the SDN network controller, and (ii) to make sensor nodes programmable as finite state machines so enabling them to run operations that cannot be supported by stateless solutions. A detailed description of SDN-WISE is provided in this paper. SDN-WISE offers APIs that allow software developers to implement the SDN Controller using the programming language they prefer. This represents a major advantage of SDN-WISE as compared to existing solutions because it increases flexibility and simplicity in network programming. A prototype of SDN-WISE has been implemented and is described in this paper. Such implementation contains the modules that allow a real SDN Controller to manage an OMNeT++ simulated network. Finally, the paper illustrates the results obtained through an experimental testbed which has been developed to evaluate the performance of SDN-WISE in several operating conditions.

342 citations


Journal ArticleDOI
TL;DR: This work develops one data collection protocol called EDAL, which stands for Energy-efficient Delay-aware Lifetime-balancing data collection, and proposes both a centralized heuristic to reduce its computational overhead and a distributed heuristics to make the algorithm scalable for large-scale network operations.
Abstract: Our work in this paper stems from our insight that recent research efforts on open vehicle routing (OVR) problems, an active area in operations research, are based on similar assumptions and constraints compared to sensor networks. Therefore, it may be feasible that we could adapt these techniques in such a way that they will provide valuable solutions to certain tricky problems in the wireless sensor network (WSN) domain. To demonstrate that this approach is feasible, we develop one data collection protocol called EDAL, which stands for Energy-efficient Delay-aware Lifetime-balancing data collection. The algorithm design of EDAL leverages one result from OVR to prove that the problem formulation is inherently NP-hard. Therefore, we proposed both a centralized heuristic to reduce its computational overhead and a distributed heuristic to make the algorithm scalable for large-scale network operations. We also develop EDAL to be closely integrated with compressive sensing, an emerging technique that promises considerable reduction in total traffic cost for collecting sensor readings under loose delay bounds. Finally, we systematically evaluate EDAL to compare its performance to related protocols in both simulations and a hardware testbed.

332 citations


Journal ArticleDOI
01 Sep 2015
TL;DR: The document discusses the applicability and limitations of existing IP-based Internet security protocols and other security protocols used in wireless sensor networks, which are potentially suitable in the context of IoT.
Abstract: The Internet of Things or "IoT" defines a highly interconnected network of heterogeneous devices where all kinds of communications seem to be possible, even unauthorized ones. As a result, the security requirement for such network becomes critical whilst common standard Internet security protocols are recognized as unusable in this type of networks, particularly due to some classes of IoT devices with constrained resources. The document discusses the applicability and limitations of existing IP-based Internet security protocols and other security protocols used in wireless sensor networks, which are potentially suitable in the context of IoT. The analysis of these protocols is discussed based on a taxonomy focusing on the key distribution mechanism.

307 citations


Proceedings ArticleDOI
09 Nov 2015
TL;DR: Minet-WiFi is introduced as a tool to emulate wireless OpenFlow/SDN scenarios allowing high-fidelity experiments that replicate real networking environments and elaborate on the potential applications of Mininet-Wifi and discuss the benefits and current limitations.
Abstract: As the density of wireless networks continues to grow with more clients, more base stations, and more traffic, designing cost-effective wireless solutions with efficient resource usage and ease to manage is an increasing challenging task due to the overall system complexity. A number of vendors offer scalable and high-performance wireless networks but at a high cost and commonly as a single-vendor solution, limiting the ability to innovate after roll-out. Recent Software-Defined Networking (SDN) approaches propose new means for network virtualization and programmability advancing the way networks can be designed and operated, including user-defined features and customized behaviour even at run-time. However, means for rapid prototyping and experimental evaluation of SDN for wireless environments are not yet available. This paper introduces Mininet-WiFi as a tool to emulate wireless OpenFlow/SDN scenarios allowing high-fidelity experiments that replicate real networking environments. Mininet-WiFi augments the well-known Mininet emulator with virtual wireless stations and access points while keeping the original SDN capabilities and the lightweight virtualization software architecture. We elaborate on the potential applications of Mininet-Wifi and discuss the benefits and current limitations. Two use cases based on IEEE 802.11 demonstrate available functionality in our open source developments.

Journal ArticleDOI
TL;DR: The key approach to enable efficient and reliable management of WSN within an infrastructure supporting various WSN applications and services is a cross-layer design of lightweight and cloud-based RESTful Web service.
Abstract: With the accelerated development of Internet-of-Things (IoT), wireless sensor networks (WSNs) are gaining importance in the continued advancement of information and communication technologies, and have been connected and integrated with the Internet in vast industrial applications. However, given the fact that most wireless sensor devices are resource constrained and operate on batteries, the communication overhead and power consumption are therefore important issues for WSNs design. In order to efficiently manage these wireless sensor devices in a unified manner, the industrial authorities should be able to provide a network infrastructure supporting various WSN applications and services that facilitate the management of sensor-equipped real-world entities. This paper presents an overview of industrial ecosystem, technical architecture, industrial device management standards, and our latest research activity in developing a WSN management system. The key approach to enable efficient and reliable management of WSN within such an infrastructure is a cross-layer design of lightweight and cloud-based RESTful Web service.

Journal ArticleDOI
TL;DR: A survey on potential renewable energy resources along with their characteristics and applications in WSN and various battery recharging techniques and their applications with respect to WSN are presented.
Abstract: In recent years there has been several technological advances in Wireless Sensor Networks (WSN), but energy still remains a paramount resource. The amount of available energy has a direct effect on the performance, functionality and lifetime of WSN. Being bound by cost and size, sensor nodes are usually equipped with limited amount of energy and therefore requires a replacement of batteries occasionally. But replacement might not always be feasible option and in some scenarios might even be prohibitive. This indicates the need for more viable solutions, these involve generating energy at the sensor nodes or have it delivered to them i.e., energy harvesting or wireless energy transfer. The objective of this paper is threefold: first we present a survey on potential renewable energy resources along with their characteristics and applications in WSN. Second, this study also describes various battery recharging techniques and their applications with respect to WSN. Finally, we discuss formidable issues, challenges and future research directions.

Journal ArticleDOI
TL;DR: This paper adopts a power-law decaying data model verified by real data sets and proposes a random projection-based estimation algorithm for this data model, which requires fewer compressed measurements and greatly reduces the energy consumption.
Abstract: Data collection is a crucial operation in wireless sensor networks. The design of data collection schemes is challengingdue to the limited energy supply and the hot spot problem. Leveraging empirical observations that sensory data possess strongspatiotemporal compressibility, this paper proposes a novel compressive data collection scheme for wireless sensor networks. We adopt a power-law decaying data model verified by real data sets and then propose a random projection-based estimation algorithm for this data model. Our scheme requires fewer compressed measurements, thus greatly reduces the energy consumption. It allowssimple routing strategy without much computation and control overheads, which leads to strong robustness in practical applications. Analytically, we prove that it achieves the optimal estimation error bound. Evaluations on real data sets (from the GreenOrbs, IntelLab and NBDC-CTD projects) show that compared with existing approaches, this new scheme prolongs the network lifetime by $1.5 \times$ to $2 \times$ for estimation error 5-20 percent.

Journal ArticleDOI
TL;DR: This article discusses the challenges and opportunities in the design of scalable wireless systems to embrace the big data era, and introduces methods to capitalize on the vast data traffic for building a big-data-aware wireless network with better wireless service quality and new mobile applications.
Abstract: The rapidly growing wave of wireless data service is pushing against the boundary of our communication network's processing power. The pervasive and exponentially increasing data traffic present imminent challenges to all aspects of wireless system design, such as spectrum efficiency, computing capabilities, and fronthaul/backhaul link capacity. In this article, we discuss the challenges and opportunities in the design of scalable wireless systems to embrace the big data era. On one hand, we review the state-of-the-art networking architectures and signal processing techniques adaptable for managing big data traffic in wireless networks. On the other hand, instead of viewing mobile big data as an unwanted burden, we introduce methods to capitalize on the vast data traffic, for building a big-data-aware wireless network with better wireless service quality and new mobile applications. We highlight several promising future research directions for wireless communications in the mobile big data era.

Journal ArticleDOI
TL;DR: A survey of the recent advances in radio resource allocation in CR sensor networks (CRSNs) is presented and an insight into the related issues and challenges is provided, and future research directions are clearly identified.
Abstract: Wireless sensor networks (WSNs) use the unlicensed industrial, scientific, and medical (ISM) band for transmissions. However, with the increasing usage and demand of these networks, the currently available ISM band does not suffice for their transmissions. This spectrum insufficiency problem has been overcome by incorporating the opportunistic spectrum access capability of cognitive radio (CR) into the existing WSN, thus giving birth to CR sensor networks (CRSNs). The sensor nodes in CRSNs depend on power sources that have limited power supply capabilities. Therefore, advanced and intelligent radio resource allocation schemes are very essential to perform dynamic and efficient spectrum allocation among sensor nodes and to optimize the energy consumption of each individual node in the network. Radio resource allocation schemes aim to ensure QoS guarantee, maximize the network lifetime, reduce the internode and internetwork interferences, etc. In this paper, we present a survey of the recent advances in radio resource allocation in CRSNs. Radio resource allocation schemes in CRSNs are classified into three major categories, i.e., centralized, cluster-based, and distributed. The schemes are further divided into several classes on the basis of performance optimization criteria that include energy efficiency, throughput maximization, QoS assurance, interference avoidance, fairness and priority consideration, and hand-off reduction. An insight into the related issues and challenges is provided, and future research directions are clearly identified.

Journal ArticleDOI
TL;DR: The distributed filtering problem is investigated for a class of discrete time-varying systems with an event-based communication mechanism, where a novel matrix simplification technique is developed to handle the challenges resulting from the sparseness of the sensor network topology and filter structure preserving issues.
Abstract: In this technical note, the distributed filtering problem is investigated for a class of discrete time-varying systems with an event-based communication mechanism. Each intelligent sensor node transmits the data to its neighbors only when the local innovation violates a predetermined Send-on-Delta (SoD) data transmission condition. The aim of the proposed problem is to construct a distributed filter for each sensor node subject to sporadic communications over wireless networks. In terms of an event indicator variable, the triggering information is utilized so as to reduce the conservatism in the filter analysis. An upper bound for the filtering error covariance is obtained in form of Riccati-like difference equations by utilizing the inductive method. Subsequently, such an upper bound is minimized by appropriately designing the filter parameters iteratively, where a novel matrix simplification technique is developed to handle the challenges resulting from the sparseness of the sensor network topology and filter structure preserving issues. The effectiveness of the proposed strategy is illustrated by a numerical simulation.

Journal ArticleDOI
TL;DR: Extensive simulations and real testbed results show that the proposed solution ENS_OR can significantly improve the network performance on energy saving and wireless connectivity in comparison with other existing WSN routing schemes.
Abstract: Energy savings optimization becomes one of the major concerns in the wireless sensor network (WSN) routing protocol design, due to the fact that most sensor nodes are equipped with the limited nonrechargeable battery power. In this paper, we focus on minimizing energy consumption and maximizing network lifetime for data relay in one-dimensional (1-D) queue network. Following the principle of opportunistic routing theory, multihop relay decision to optimize the network energy efficiency is made based on the differences among sensor nodes, in terms of both their distance to sink and the residual energy of each other. Specifically, an Energy Saving via Opportunistic Routing (ENS_OR) algorithm is designed to ensure minimum power cost during data relay and protect the nodes with relatively low residual energy. Extensive simulations and real testbed results show that the proposed solution ENS_OR can significantly improve the network performance on energy saving and wireless connectivity in comparison with other existing WSN routing schemes.

Journal ArticleDOI
TL;DR: A new regional energy aware clustering method using isolated nodes for WSNs, called Regional Energy Aware Clustering with Isolated Nodes (REAC-IN), which outperforms other clustering algorithms.
Abstract: A suitable clustering algorithm for grouping sensor nodes can increase the energy efficiency of WSNs. However, clustering requires additional overhead, such as cluster head selection and assignment, and cluster construction. This paper proposes a new regional energy aware clustering method using isolated nodes for WSNs, called Regional Energy Aware Clustering with Isolated Nodes (REAC-IN). In REAC-IN, CHs are selected based on weight. Weight is determined according to the residual energy of each sensor and the regional average energy of all sensors in each cluster. Improperly designed distributed clustering algorithms can cause nodes to become isolated from CHs. Such isolated nodes communicate with the sink by consuming excess amount of energy. To prolong network lifetime, the regional average energy and the distance between sensors and the sink are used to determine whether the isolated node sends its data to a CH node in the previous round or to the sink. The simulation results of the current study revealed that REAC-IN outperforms other clustering algorithms.

Journal ArticleDOI
TL;DR: Experimental tests demonstrate that the proposed system for smart home control networks is practically feasible and performs well and the impact of wireless interference on the proposedsmart home control network is substantially mitigated.
Abstract: Wireless sensor networks (WSNs) and power line communications (PLCs) are used in this work to implement a smart home control network. The goals are to reduce the impact of wireless interference on a smart home control network and unnecessary energy consumption of a smart home. An isolated WSN with one coordinator, which is integrated into the PLC transceiver, is established in each room. The coordinator is responsible for transferring environmental parameters obtained by WSNs to the management station via PLCs. The control messages for home appliances are directly transferred using PLCs rather than WSNs. According to the experimental results, the impact of wireless interference on the proposed smart home control network is substantially mitigated. Additionally, a smart control algorithm for lighting systems and an analysis of the illumination of a fluorescent lamp were presented. The energy saving of lighting systems relative to those without smart control was evaluated. Numerical results indicate that the electricity consumption on a sunny or cloudy day can be reduced by at least 40% under the smart control. Moreover, a prototype for the proposed smart home control network with the smart control algorithm was implemented. Experimental tests demonstrate that the proposed system for smart home control networks is practically feasible and performs well.

Journal ArticleDOI
TL;DR: The proposed EDTM can evaluate trustworthiness of sensor nodes more precisely and prevent the security breaches more effectively and outperforms other similar models, e.g., NBBTE trust model.
Abstract: Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research work only takes communication behavior into account to calculate sensor nodes’ trust value, which is not enough for trust evaluation due to the widespread malicious attacks. In this paper, we propose an Efficient Distributed Trust Model (EDTM) for WSNs. First, according to the number of packets received by sensor nodes, direct trust and recommendation trust are selectively calculated. Then, communication trust, energy trust and data trust are considered during the calculation of direct trust. Furthermore, trust reliability and familiarity are defined to improve the accuracy of recommendation trust. The proposed EDTM can evaluate trustworthiness of sensor nodes more precisely and prevent the security breaches more effectively. Simulation results show that EDTM outperforms other similar models, e.g., NBBTE trust model.

Journal ArticleDOI
TL;DR: It is shown that integrating wireless network virtualization with ICN techniques can significantly improve the end-to-end network performance and the resulting schemes significantly outperform the other existing schemes.
Abstract: Wireless network virtualization and information-centric networking (ICN) are two promising techniques in software-defined 5G mobile wireless networks. Traditionally, these two technologies have been addressed separately. In this paper we show that integrating wireless network virtualization with ICN techniques can significantly improve the end-to-end network performance. In particular, we propose an information- centric wireless network virtualization architecture for integrating wireless network virtualization with ICN. We develop the key components of this architecture: radio spectrum resource, wireless network infrastructure, virtual resources (including content-level slicing, network-level slicing, and flow-level slicing), and informationcentric wireless virtualization controller. Then we formulate the virtual resource allocation and in-network caching strategy as an optimization problem, considering the gain of not only virtualization but also in-network caching in our proposed information-centric wireless network virtualization architecture. The obtained simulation results show that our proposed information-centric wireless network virtualization architecture and the related schemes significantly outperform the other existing schemes.

Journal ArticleDOI
TL;DR: Security analysis and performance analysis shows the proposed MAAKA scheme has better performance than the existing benchmarked schemes in literature and is more suitable for providing security for various applications in WSNs.

Journal ArticleDOI
Kai Zeng1
TL;DR: An overview of the physical layer key generation process is provided and a new key generation scheme using random probing signals, and combining user generated randomness and channel randomness is introduced as a countermeasures against active attacks.
Abstract: Physical layer key generation that exploits reciprocity and randomness of wireless fading channels has attracted considerable research attention in recent years. Although theoretical study has shown its potential to generate information- theoretic secure keys, great challenges remain when transforming the theory into practice. This article provides an overview of the physical layer key generation process and discusses its practical challenges. Different passive and active attacks are analyzed and evaluated through numerical study. A new key generation scheme using random probing signals, and combining user generated randomness and channel randomness, is introduced as a countermeasure against active attacks. The numerical results show that the proposed scheme achieves higher security strength than existing schemes using constant probing signals under active attacks. Future research topics on physical layer key generation are discussed.

Patent
23 Apr 2015
TL;DR: A wireless coverage characterization platform uses an autonomous vehicle or robot, such as an unmanned aerial vehicle or other small robot, to autonomously collect key wireless coverage parameters for an indoor environment.
Abstract: A wireless coverage characterization platform uses an autonomous vehicle or robot, such as an unmanned aerial vehicle or other small robot, to autonomously collect key wireless coverage parameters for an indoor environment. One or more vehicles or robots are equipped with integrated simultaneous localization and mapping sensors as well as wireless signal measurement sensors. As a vehicle traverses the indoor environment, on-board processing components process the sensor measurement data to simultaneously build an indoor map of the environment and to learn the wireless coverage characteristics of the environment incrementally. The vehicle's navigation system guides the vehicle through the environment based on the sensor measurements and the learned indoor map until a complete map of the wireless signal strength at all locations throughout the environment is obtained. The system can identify areas of weak wireless coverage or interference sources and recommend access point device locations based on results of the survey.

Journal ArticleDOI
TL;DR: This survey presents a high level taxonomy of energy management in WSNs and recommends taking into account recent energy provisioning advancements in parallel with the traditional energy conservation approaches for a sensor network while designing energy efficient schemes.

Journal ArticleDOI
TL;DR: This paper outlines the merits and limitations of the clustering schemes in WSNs, and proposes a taxonomy of cluster based routing methods, which are broadly classified into three categories: flat routing, hierarchical or clusterbased routing, and location based routing.

Journal ArticleDOI
TL;DR: The experimental results shows that the proposed EE-LEACH yields better performance than the existing energy-balanced routing protocol (EBRP) and LEACH Protocol in terms of better packet delivery ratio, lesser end-to-end delay and energy consumption.
Abstract: A wireless sensor network (WSN) consists of a huge number of sensor nodes that are inadequate in energy, storage and processing power. One of the major tasks of the sensor nodes is the collection of data and forwarding the gathered data to the base station (BS). Hence, the network lifetime becomes the major criteria for effective design of the data gathering schemes in WSN. In this paper, an energy-efficient LEACH (EE-LEACH) Protocol for data gathering is introduced. It offers an energy-efficient routing in WSN based on the effective data ensemble and optimal clustering. In this system, a cluster head is elected for each clusters to minimize the energy dissipation of the sensor nodes and to optimize the resource utilization. The energy-efficient routing can be obtained by nodes which have the maximum residual energy. Hence, the highest residual energy nodes are selected to forward the data to BS. It helps to provide better packet delivery ratio with lesser energy utilization. The experimental results shows that the proposed EE-LEACH yields better performance than the existing energy-balanced routing protocol (EBRP) and LEACH Protocol in terms of better packet delivery ratio, lesser end-to-end delay and energy consumption. It is obviously proves that the proposed EE-LEACH can improve the network lifetime.

Journal ArticleDOI
TL;DR: A new algorithm for optimizing the traffic offloading process in D2D communications is developed and the Chernoff bound and approximated cumulative distribution function (cdf) of the offloaded traffic are derived and the validity of the bound and cdf is proven.
Abstract: Device-to-device (D2D) communication is seen as a major technology to overcome the imminent wireless capacity crunch and to enable new application services. In this paper, a novel social-aware approach for optimizing D2D communication by exploiting two layers, namely the social network layer and the physical wireless network layer, is proposed. In particular, the physical layer D2D network is captured via the users' encounter histories. Subsequently, an approach, based on the so-called Indian Buffet Process, is proposed to model the distribution of contents in the users' online social networks. Given the social relations collected by the base station, a new algorithm for optimizing the traffic offloading process in D2D communications is developed. In addition, the Chernoff bound and approximated cumulative distribution function (cdf) of the offloaded traffic are derived and the validity of the bound and cdf is proven. Simulation results based on real traces demonstrate the effectiveness of our model and show that the proposed approach can offload the network's traffic successfully.

Journal ArticleDOI
TL;DR: This work analyzes the on-demand mobile charging problem using a simple but efficient Nearest-Job-Next with Preemption (NJNP) discipline for the mobile charger, and provides analytical results on the system throughput and charging latency from the perspectives of theMobile charger and individual sensor nodes, respectively.
Abstract: Recently, adopting mobile energy chargers to replenish the energy supply of sensor nodes in wireless sensor networks has gained increasing attention from the research community. Different from energy harvesting systems, the utilization of mobile energy chargers is able to provide more reliable energy supply than the dynamic energy harvested from the surrounding environment. While pioneering works on the mobile recharging problem mainly focus on the optimal offline path planning for the mobile chargers, in this work, we aim to lay the theoretical foundation for the on-demand mobile charging (DMC) problem, where individual sensor nodes request charging from the mobile charger when their energy runs low. Specifically, in this work, we analyze the on-demand mobile charging problem using a simple but efficient Nearest-Job-Next with Preemption (NJNP) discipline for the mobile charger, and provide analytical results on the system throughput and charging latency from the perspectives of the mobile charger and individual sensor nodes, respectively. To demonstrate how the actual system design can benefit from our analytical results, we present two examples on determining the essential system parameters such as the optimal remaining energy level for individual sensor nodes to send out their recharging requests and the minimal energy capacity required for the mobile charger. Through extensive simulation with real-world system settings, we verify that our analytical results match the simulation results well and the system designs based on our analysis are effective.