Current Search: info:fedora/islandora:personCModel (x) » Broadsides --Florida --Miami (x) » Department of Computer and Electrical Engineering and Computer Science (x) » Sensor networks (x)
View All Items
- Title
- A UNIFIED SOFT SENSING FRAMEWORK FOR COMPLEX DYNAMICAL SYSTEMS.
- Creator
- Huang, Yu, Tang, Yufei, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
In the past few years, the development of complex dynamical networks or systems has stimulated great interest in the study of the principles and mechanisms underlying the Internet of things (IoT). IoT is envisioned as an intelligent network infrastructure with a vast number of ubiquitous smart devices present in diverse application domains and have already improved many aspects of daily life. Many overtly futuristic IoT applications acquire data gathered via distributed sensors that can be...
Show moreIn the past few years, the development of complex dynamical networks or systems has stimulated great interest in the study of the principles and mechanisms underlying the Internet of things (IoT). IoT is envisioned as an intelligent network infrastructure with a vast number of ubiquitous smart devices present in diverse application domains and have already improved many aspects of daily life. Many overtly futuristic IoT applications acquire data gathered via distributed sensors that can be uniquely identified, localized, and communicated with, i.e., the support of sensor networks. Soft-sensing models are in demand to support IoT applications to achieve the maximal exploitation of transforming the information of measurements into more useful knowledge, which plays essential roles in condition monitoring, quality prediction, smooth control, and many other essential aspects of complex dynamical systems. This in turn calls for innovative soft-sensing models that account for scalability, heterogeneity, adaptivity, and robustness to unpredictable uncertainties. The advent of big data, the advantages of ever-evolving deep learning (DL) techniques (where models use multiple layers to extract multi-levels of feature representations progressively), as well as ever-increasing processing power in hardware, has triggered a proliferation of research that applies DL to soft-sensing models. However, many critical questions need to be further investigated in the deep learning-based soft-sensing.
Show less - Date Issued
- 2022
- PURL
- http://purl.flvc.org/fau/fd/FA00013993
- Subject Headings
- Dynamical systems, Dynamics, Sensor networks, Deep learning (Machine learning)
- Format
- Document (PDF)
- Title
- Design and implementation of an energy model for JiST/SWANS simulator.
- Creator
- Sutaria, Trishla., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless sensor networks are one of the first real world examples of pervasive computing, the notion that small, smart, and cheap sensing and computing devices will eventually permeate the environment. Sensor networks consist of very large number of energy constrained nodes and to properly evaluate these networks a scalable ad-hoc wireless network simulator with an energy model is needed. Since most of the existing simulators have been designed for ad-hoc network with low scalability they can...
Show moreWireless sensor networks are one of the first real world examples of pervasive computing, the notion that small, smart, and cheap sensing and computing devices will eventually permeate the environment. Sensor networks consist of very large number of energy constrained nodes and to properly evaluate these networks a scalable ad-hoc wireless network simulator with an energy model is needed. Since most of the existing simulators have been designed for ad-hoc network with low scalability they can not be used to accurately simulate sensor networks. The JiST/SWANS simulator is one of the newer simulators that has been developed by Cornell University for simulating ad-hoc networks and is highly scalable which makes it appropriate for use in evaluating sensor networks. Since this simulator lack energy model our objective is to design and implement an energy model for JiST/SWANS so that it can adequately and accurately calculate the amount of energy consumption in the simulation of sensor networks.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13275
- Subject Headings
- Sensor networks, Wireless LANs, Computer network protocols, Wireless communication systems
- Format
- Document (PDF)
- Title
- Home automation and power conservation using ZigBeeª.
- Creator
- DiBenedetto, Michael G., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The ZigBee standard is a wireless networking standard created and maintained by the ZigBee Alliance. The standard aims to provide an inexpensive, reliable, and efficient solution for wirelessly networked sensing and control products. The ZigBee Alliance is composed of over 300 member companies making use of the standard in different ways, ranging from energy management and efficiency, to RF remote controls, to health care products. Home automation is one market that greatly benefits from the...
Show moreThe ZigBee standard is a wireless networking standard created and maintained by the ZigBee Alliance. The standard aims to provide an inexpensive, reliable, and efficient solution for wirelessly networked sensing and control products. The ZigBee Alliance is composed of over 300 member companies making use of the standard in different ways, ranging from energy management and efficiency, to RF remote controls, to health care products. Home automation is one market that greatly benefits from the use of ZigBee. With a focus on conserving home electricity use, a sample design is created to test a home automation network using Freescale's ZigBee platform. Multiple electrical designs are tested utilizing sensors ranging from proximity sensors to current sense transformers. Software is fashioned as well, creating a PC application that interacts with two ZigBee transceiver boards performing different home automation functions such as air conditioner and automatic lighting control.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/368609
- Subject Headings
- Sensor networks, Wireless LANs, Computer network architecture, Assistive computer technology
- Format
- Document (PDF)
- Title
- Implementation of a mobile data collector in wireless sensor networks for energy conservation.
- Creator
- Heshike, Pedro L., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Wireless Sensor Network (WSN) is composed of low-cost electronic devices with sensing, data storage and transmitting capabilities, powered by batteries. There are extensive studies in the field of WSN investigating different algorithms and protocols for data collection. A data collector can be static or mobile. Using a mobile data collector can extend network lifetime and can be used to collect sensor data in hardly accessible locations, partitioned networks, and delay-tolerant networks....
Show moreA Wireless Sensor Network (WSN) is composed of low-cost electronic devices with sensing, data storage and transmitting capabilities, powered by batteries. There are extensive studies in the field of WSN investigating different algorithms and protocols for data collection. A data collector can be static or mobile. Using a mobile data collector can extend network lifetime and can be used to collect sensor data in hardly accessible locations, partitioned networks, and delay-tolerant networks. The implementation of the mobile data collector in our study consists of combining two different platforms: the Crossbow sensor hardware and the NXT Legos. We developed an application for data collection and sensor querying support. Another important contribution is designing a semi-autonomous robot control. This hardware prototype implementation shows the benefits of using a mobile data collector in WSN. It also serves as a reference in developing future applications for mobile WSNs.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3171401
- Subject Headings
- Wireless communication systems, Technological innovations, Sensor networks, Design and construction, Compter network protocols, Ad hoc networks (Computer networks), Technological innovations
- Format
- Document (PDF)
- Title
- Implementation of the Sensor-MAC protocol for the JiST/SWANS simulator.
- Creator
- Tippanagoudar, Veerendra., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years, advances in wireless technologies have enabled novel applications for wireless devices. Sensor network is one such application that consists of large number of battery-operated nodes. To simulate such networks with large number of nodes, a wireless sensor network simulator that is highly scalable is vital. JiST/SWANS is one such simulator that is highly scalable. However, the JiST/SWANS MAC layer implementation of 802.11b is not suitable for sensor networks, which are energy...
Show moreIn recent years, advances in wireless technologies have enabled novel applications for wireless devices. Sensor network is one such application that consists of large number of battery-operated nodes. To simulate such networks with large number of nodes, a wireless sensor network simulator that is highly scalable is vital. JiST/SWANS is one such simulator that is highly scalable. However, the JiST/SWANS MAC layer implementation of 802.11b is not suitable for sensor networks, which are energy-constrained. Hence, our main focus is to implement the S-MAC protocol in JiST/SWANS. The S-MAC protocol allows the nodes to go to sleep and thereby it helps conserve energy. This subsequently helps the nodes to extend their effective lifetime. We validate our S-MAC protocol implementation in the JiST/SWANS through simulations.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13396
- Subject Headings
- Wireless communication systems, Sensor networks, Wireless LANs
- Format
- Document (PDF)
- Title
- Local construction of connected dominating sets in wireless ad hoc networks.
- Creator
- Dai, Fei., Florida Atlantic University, Wu, Jie, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless ad hoc networks are infrastructure-less multi-hop networks consisting of mobile (such as in mobile ad hoc networks) or stationary (such as in wireless sensor networks) wireless devices. These networks involve several challenges, including limited bandwidth and energy resources, frequent topology changes, and a lack of central control. Local acting, self-organizing, and self-healing algorithms (also called localized algorithms) are essential to the design of wireless ad hoc networks....
Show moreWireless ad hoc networks are infrastructure-less multi-hop networks consisting of mobile (such as in mobile ad hoc networks) or stationary (such as in wireless sensor networks) wireless devices. These networks involve several challenges, including limited bandwidth and energy resources, frequent topology changes, and a lack of central control. Local acting, self-organizing, and self-healing algorithms (also called localized algorithms) are essential to the design of wireless ad hoc networks. A connected dominating set (CDS) is frequently used in wireless ad hoc networks as a virtual backbone to support efficient routing, service discovery, and area monitoring. In addition, efficient broadcasting (i.e., finding a small set of forward nodes to ensure full delivery) can be viewed as forming a CDS on-the-fly. The periodically maintained virtual backbone is called a static CDS, and the temporarily formed forward node set is called a dynamic CDS. For efficiency and robustness, the ideal CDS construction algorithm is lightweight, has fast convergence, and minimizes the CDS size. This dissertation focuses on providing a generic framework to unify localized CDS construction schemes, including both static and dynamic CDS constructions, for wireless ad hoc networks. The goal is to provide insights on how to form a small CDS (forward node set) in dynamic networks with affordable overhead and high robustness. A classification of CDS construction algorithms for wireless ad hoc networks has been provided at the beginning. An efficient scheme, called Rule K, has been proposed for static CDS construction. Rule K achieves a probabilistic constant upper bound on the expected CDS size, which is currently the best known performance guarantee for localized CDS algorithms. Rule K has been extended to a unified framework, called the coverage condition, which contains most existing localized virtual backbone construction and efficient broadcast algorithms as its special cases. The coverage condition has been further extended to construct a k-connected k-dominating set for higher robustness, and integrated in an iterative process that further reduces the CDS size while maintaining the same level of robustness.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/12144
- Subject Headings
- Wireless communication systems, Electronic digital computers--Power supply, Mobile computing, Sensor networks
- Format
- Document (PDF)
- Title
- Low latency and energy efficient MAC protocols for wireless sensor networks.
- Creator
- Abu-El Humos, Ali M., Florida Atlantic University, Alhalabi, Bassem A., Cardei, Mihaela, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Energy consumption is a critical design issue in Wireless Sensor Networks (WSNs), since sensor nodes are battery operated, and replacing or recharging the battery is usually infeasible. Energy efficient solutions are sought at all network levels, especially at the medium access level. The IEEE 802.11 MAC protocol is optimized for Ad hoc Wireless Networks, but cannot be adopted for WSNs because it has the idle listening problem, which is a major source of energy waste. Several Medium Access...
Show moreEnergy consumption is a critical design issue in Wireless Sensor Networks (WSNs), since sensor nodes are battery operated, and replacing or recharging the battery is usually infeasible. Energy efficient solutions are sought at all network levels, especially at the medium access level. The IEEE 802.11 MAC protocol is optimized for Ad hoc Wireless Networks, but cannot be adopted for WSNs because it has the idle listening problem, which is a major source of energy waste. Several Medium Access Control (MAC) protocols have been proposed for WSNs to save the transceiver energy by introducing periodic listen/sleep cycles, and thus overcome the idle listing problem. The periodic listen sleep cycles, however, will increase the network latency and require extra overhead to establish and maintain synchronization among nodes in the network. This dissertation introduces a new MAC protocol for WSNs based on the SMAC protocol to improve its latency performance without compromising its energy consumption. The original SMAC provides an efficient solution for the energy consumption problem due to idle listening, but it increases latency especially in low duty cycle applications. TMAC was proposed to further reduce the energy consumption in SMAC and introduced the Forward Request-To-Send (FRTS) packet to solve the early sleep problem observed in TMAC. Later, Adaptive SMAC was proposed to reduce the latency problem in SMAC by at least 50% at light traffic load. Our new protocol, FASMAC, combines the advantages of both adaptive listening and the usage of FRTS packet in TMAC to further reduce the latency of SMAC. In FASMAC, a packet can travel at least three hops away from its source node within one time cycle. This results in at least 67% reduction in latency at light traffic when compared with the original SMAC. We also propose an energy model for performance evaluation of WSNs protocols using the network simulator NS2. The current energy model of NS2 was designed to handle Ad hoc Wireless Networks where the low power consumption sleep mode was not an issue. However, this is not the case in WSNs. We show that NS2 energy model is not suitable to evaluate the performance of WSNs protocols because it does not account for the low power sleep mode. This dissertation proposes a solution to this deficiency and provides simulation results that match real experimental results performed on the actual sensor motes.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/12149
- Subject Headings
- Wireless communication systems, Sensor networks, Power resources--Efficiency
- Format
- Document (PDF)
- Title
- Mechanisms for improving energy efficiency in wireless sensor networks.
- Creator
- Fonoage, Mirela Ioana., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed in an area. One of the main issues addressed in WSNs research is energy efficiency due to sensors' limited energy resources. WSNs are deployed to monitor and control the physical environment, and to transmit the collected data to one or more sinks using multi-hop communication. Energy efficiency protocols represent a key mechanism in WSNs. This dissertation proposes several methods used to...
Show moreA Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed in an area. One of the main issues addressed in WSNs research is energy efficiency due to sensors' limited energy resources. WSNs are deployed to monitor and control the physical environment, and to transmit the collected data to one or more sinks using multi-hop communication. Energy efficiency protocols represent a key mechanism in WSNs. This dissertation proposes several methods used to prolong WSNs lifetime focusing on designing energy efficient communication protocols. A critical issue for data gathering in WSNs is the formation of energy holes near the sinks where sensor nodes participate more in relaying data on behalf of other sensors. The solution proposed in this dissertation is to use mobile sinks that change their location to overcome the formation of energy holes. First, a study of the improvement in network lifetime when sinks move along the perimeter of a hexagonal tiling is conveyed. Second, a design of a distributed and localized algorithm used by sinks to decide their next move is proposed. Two extensions of the distributed algorithm, coverage and time-delivery requirement, are also addressed. Sensor scheduling mechanisms are used to increase network lifetime by sending redundant sensor nodes to sleep. In this dissertation a localized connected dominating set based approach is used to optimize network lifetime of a composite event detection application. A set of active nodes form a connected set that monitor the environment and send data to sinks. After some time, a new active nodes set is chosen. Thus, network lifetime is prolonged by alternating the active sensors. QoS is another main issue encountered in WSNs because of the dynamically changing network topology., This dissertation introduces an energy efficient QoS based routing for periodic and event-based reporting applications. A geographic routing mechanism combined with QoS support is used to forward packets in the network. Congestion control is achieved by using a ring or barrier mechanism that captures and aggregates messages that report the same event to the same sink. The main operations of the barrier mechanism are presented in this dissertation.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/2975242
- Subject Headings
- Computer network protocols, Wireless communication systems, Technological innovations, Sensor networks, Design and construction
- Format
- Document (PDF)
- Title
- Mechanisms for prolonging network lifetime in wireless sensor networks.
- Creator
- Yang, Yinying., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Sensors are used to monitor and control the physical environment. A Wireless Sen- sor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [18][5]. Sensor nodes measure various parameters of the environment and transmit data collected to one or more sinks, using hop-by-hop communication. Once a sink receives sensed data, it processes and forwards it to the users. Sensors are usually battery powered and it is...
Show moreSensors are used to monitor and control the physical environment. A Wireless Sen- sor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [18][5]. Sensor nodes measure various parameters of the environment and transmit data collected to one or more sinks, using hop-by-hop communication. Once a sink receives sensed data, it processes and forwards it to the users. Sensors are usually battery powered and it is hard to recharge them. It will take a limited time before they deplete their energy and become unfunctional. Optimizing energy consumption to prolong network lifetime is an important issue in wireless sensor networks. In mobile sensor networks, sensors can self-propel via springs [14], wheels [20], or they can be attached to transporters, such as robots [20] and vehicles [36]. In static sensor networks with uniform deployment (uniform density), sensors closest to the sink will die first, which will cause uneven energy consumption and limitation of network life- time. In the dissertation, the nonuniform density is studied and analyzed so that the energy consumption within the monitored area is balanced and the network lifetime is prolonged. Several mechanisms are proposed to relocate the sensors after the initial deployment to achieve the desired density while minimizing the total moving cost. Using mobile relays for data gathering is another energy efficient approach. Mobile sensors can be used as ferries, which carry data to the sink for static sensors so that expensive multi-hop communication and long distance communication are reduced. In this thesis, we propose a mobile relay based routing protocol that considers both energy efficiency and data delivery delay. It can be applied to both event-based reporting and periodical report applications., Another mechanism used to prolong network lifetime is sensor scheduling. One of the major components that consume energy is the radio. One method to conserve energy is to put sensors to sleep mode when they are not actively participating in sensing or data relaying. This dissertation studies sensor scheduling mechanisms for composite event detection. It chooses a set of active sensors to perform sensing and data relaying, and all other sensors go to sleep to save energy. After some time, another set of active sensors is chosen. Thus sensors work alternatively to prolong network lifetime.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1870693
- Subject Headings
- Wireless communication systems, Technological innovations, Wireless communication systems, Design and construction, Ad hoc networks (Computer networks), Technological innovations, Sensor networks, Design and construction, Computer algorithms, Computer network protocols
- Format
- Document (PDF)
- Title
- Range assignment problem and security in wireless networks.
- Creator
- Pervaiz, Mohammad O., Florida Atlantic University, Cardei, Mihaela, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis considers two important issues in wireless networks. In first part, we address Energy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks (HRA) and in second part, we present a survey on security attacks in ad hoc wireless networks. We address the HRA problem by selecting the transmission range for each energy-constraint sensor node such that a multi-hop communication path exists between each sensor' node and a resource-rich supernode while maximum power required...
Show moreThis thesis considers two important issues in wireless networks. In first part, we address Energy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks (HRA) and in second part, we present a survey on security attacks in ad hoc wireless networks. We address the HRA problem by selecting the transmission range for each energy-constraint sensor node such that a multi-hop communication path exists between each sensor' node and a resource-rich supernode while maximum power required is minimized. This is the first work to address this problem. We propose several solutions: an Integer Programming approach, a distributed greedy protocol, and a minimum spanning tree protocol based on clustering. In second part of this thesis, a survey is carried out on security attacks on routing protocols in ad hoc wireless network. We examine and classify major routing attacks and present a comprehensive survey on the state-of-the-art mechanisms and solutions designed to defeat such attacks.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13341
- Subject Headings
- Wireless communication systems--Security measures, Sensor networks, Wireless LANs--Security measures, Power resources--Efficiency
- Format
- Document (PDF)
- Title
- Reliable, energy-aware cross-layer protocol for wireless sensor networks.
- Creator
- Badi, Ahmed., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research addresses communication reliability in the highly constrained wireless sensor networks environment. We propose a cross-layer, reliable wireless sensor protocol design. The protocol benefits from the body of research in the two areas of wireless sensors reliability research and wireless sensors energy conservation research. The protocol introduces a new energy saving technique that considers reliability as a design parameter and constraint. The protocol also introduces a new back...
Show moreThis research addresses communication reliability in the highly constrained wireless sensor networks environment. We propose a cross-layer, reliable wireless sensor protocol design. The protocol benefits from the body of research in the two areas of wireless sensors reliability research and wireless sensors energy conservation research. The protocol introduces a new energy saving technique that considers reliability as a design parameter and constraint. The protocol also introduces a new back-off algorithm that dynamically adjusts to the data messages reliability needs. Other cross-layer techniques that the protocol introduces are dynamic MAC retry limit and dynamic transmission power setting that is also based on the messages reliability requirements. Cross layer design is defined as the interaction between the different stack layers with the goal of improving performance. It has been used in ad hoc wireless systems to improve throughput, latency, and quality of service (QoS). The improvements gained in performance come at a price. This includes decreased architecture modularity and designs may be hard to debug, maintain or upgrade. Cross-layer design is valuable for wireless sensor networks due to the severe resource constraints. The proposed protocol uses cross-layer design as a performance and energy optimization technique. Nevertheless, the protocol avoids introducing layer interdependencies by preserving the stack architecture and optimizes the overall system energy and reliability performance by information sharing. The information is embedded as flags in the data and control messages that are moving through the stack. Each layer reads these flags and adjusts its performance and handling of the message accordingly. The performance of the proposed protocol is evaluated using simulation modeling. The reference protocol used for evaluation is APTEEN., We developed simulation programs for the proposed protocol and for APTEEN protocol using the JiST/SWANS simulation tool. The performance evaluation results show that the proposed protocol achieves better energy performance than the reference protocol. Several scalability experiments show that the proposed protocol scales well and has better performance for large networks. Also, exhaustive bandwidth utilization experiments show that for heavily-utilized or congested networks, the proposed protocol has high reliability in delivering messages classified as important.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/359921
- Subject Headings
- Computer network protocols, Wireless communication systems, Technological innovations, Sensor networks, Power resources, Efficiency
- Format
- Document (PDF)
- Title
- Reputation and trust-based security in wireless sensor networks.
- Creator
- Srinivasan, Avinash., College of Engineering and Computer Science, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This dissertation presents the results of research that led to the development of a novel reputation and trust-based monitoring paradigm for secure and reliable computing in Wireless Sensor Networks (WSNs). WSNs have undergone tremendous technological advances over the last few years. They have caused a giant leap toward "proactive computing," a paradigm where computers anticipate human needs and, when necessary, act on their behalf. Therefore, we cannot deploy such a critical technology...
Show moreThis dissertation presents the results of research that led to the development of a novel reputation and trust-based monitoring paradigm for secure and reliable computing in Wireless Sensor Networks (WSNs). WSNs have undergone tremendous technological advances over the last few years. They have caused a giant leap toward "proactive computing," a paradigm where computers anticipate human needs and, when necessary, act on their behalf. Therefore, we cannot deploy such a critical technology without first addressing the security and privacy challenges to ensure that it does not turn against those whom it is meant to benefit. The core application of WSNs is to detect and report events, be it military or civilian applications. The building blocks of a WSN are small, battery-powered, lowcost, self-contained devices called "sensors" that measure factors like light, temperature, pressure, vibration, motion, etc. A WSN usually consists of hundreds of thousands of sensors that operate in unattended, hostile territories to monitor a given geographical area. Once deployed, the wireless sensors self-organize into ad-hoc wireless networks in order to cope with the dynamics of the surveillance field. During the post deployment phase, the wireless sensors aggregate data, then process and generate a report, which is subsequently relayed from one sensor to the next using secure multi-hop routing until the data reaches its desired destination, which is usually the sink. Since sensors operate in unattended and hostile territories, the adversary can capture a sensor node physically and extract all the information stored onboard, including cryptographic keying material. With this unique situation, WSNs are subject to a unique attack referred to as an "Insider Attack," in which the adversary becomes a legitimate member of the network being represented by the captured node., To overcome this unique situation, a distributed Reputation and Trust-based Monitoring System (RTMS) is required. The most critical contribution of this dissertation work has been the proposal and design of a novel, clique-based, distributed group-key establishment protocol with specific application to RTMSs. We have also proposed and evaluated the application of RTMS models for securing beacon-based localization in WSNs addressing information asymmetry attacks, and proposed a novel k-parent tree model for securing broadcast communication in WSNs with an underlying RTMS model. Other issues addressed in this dissertation work include the proposal of a Connected Dominating Set (CDS) based reputation dissemination and bootstrapping model. This model also enables secure, certificateless node mobility and enables the model to be robust to ID Spoofing and node replication attacks.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/77652
- Subject Headings
- Sensor networks, Security measures, Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Ad hoc networks (Computer networks), Security measures
- Format
- Document (PDF)
- Title
- Scheduling for composite event detection in wireless sensor networks.
- Creator
- Ambrose, Arny Isonja, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless sensor networks are used in areas that are inaccessible, inhospitable or for continuous monitoring. The main use of such networks is for event detection. Event detection is used to monitor a particular environment for an event such as fire or flooding. Composite event detection is used to break down the detection of the event into the specific conditions that need to be present for the event to occur. Using this method, each sensor node does not need to carry every sensing component...
Show moreWireless sensor networks are used in areas that are inaccessible, inhospitable or for continuous monitoring. The main use of such networks is for event detection. Event detection is used to monitor a particular environment for an event such as fire or flooding. Composite event detection is used to break down the detection of the event into the specific conditions that need to be present for the event to occur. Using this method, each sensor node does not need to carry every sensing component necessary to detect the event. Since energy efficiency is important the sensor nodes need to be scheduled so that they consume [sic] consume as little energy as possible to extend the network lifetime. In this thesis, a solution to the sensor Scheduling for Composite Event Detection (SCED) problem will be presented as a way to improve the network lifetime when using composite event detection.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fcla/dt/186333
- Subject Headings
- Sensor networks, Wireless communication systems, Embedded computer systems, Computer systems, Reliability
- Format
- Document (PDF)
- Title
- Secure routing in wireless sensor networks.
- Creator
- Ibriq, Jamil, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency., The proposed key management scheme...
Show moreThis research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency., The proposed key management scheme is called Hierarchical Key Establishment Scheme (HIKES). In HIKES, the base station, acting as the central trust authority, empowers randomly selected sensors to act as local trust authorities, authenticating on its behalf the cluster members and issuing to them all secret keys necessary to secure their communications. HIKES uses a novel key escrow scheme that enables any sensor node selected as a cluster head to generate all the cryptographic keys needed to authenticate other sensors within its cluster. This scheme localizes secret key issuance and reduces the communication cost with the base station. The key escrow scheme also provides the HIKES with as large an addressing mechanism as needed. HIKES also provides a one-step broadcast authentication mechanism. HIKES provides entity authentication to every sensor in the network and is robust against most known attacks. We propose a hierarchical routing mechanism called Secure Hierarchical Energy-Efficient Routing protocol (SHEER). SHEER implements HIKES, which provides the communication security from the inception of the network. SHEER uses a probabilistic broadcast mechanism and a three-level hierarchical clustering architecture to improve the network energy performance and increase its lifetime., Simulation results have shown that HIKES provides an energy-efficient and scalable solution to the key management problem. Cost analysis shows that HIKES is computationally efficient and has low storage requirement. Furthermore, high degree of address flexibility can be achieved in HIKES. Therefore, this scheme meets the desired criteria set forth in this work. Simulation studies also show that SHEER is more energy-efficient and has better scalability than the secure version of LEACH using HIKES.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/FAU/42771
- Subject Headings
- Sensor networks, Security measures, Ad hoc networks (Computer networks), Security measures, Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Mobile computing
- Format
- Document (PDF)